CIS Logo
tagline: Confidence in the Connected World

CISOs today face many hurdles in securing a virtual office environment. With many employees working from home, organizations are at risk.

CIS-CAT® configuration assessment tool can now be added directly to pipelines, enabling powerful remote scanning and reporting functionality

According to Verizon’s DBIR, Educational Services performed poorly in terms of reporting phishing attacks, losing critical response time for organizations.

The CIS Controls are designed to help organizations identify the actions they need to take to defend against most common real-world attacks.

Washington State Auditor’s Office uses the CIS Controls to perform security audits and improve the security posture of state agencies & local governments.

The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, and more.

The June 2020 CIS Controls Self Assessment Tool (CSAT) Update v1.3.0 includes new features to make the tool easier to use, as well as some bug fixes.

Moving tens or hundreds of thousands of state workers to telework without cutting off critical public services has kept IT security offices busy.

The report has some recommendations to keep your digital assets secure based on findings with the Center for Internet Security Critical Security Controls.

The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.

Verizon's Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches The information and analysis

Learn more about the 2020 Verizon DBIR and how the Center for Internet Security contributed by sharing best practice expertise.

Tony Sager discusses the way that the COVID-19 pandemic is changing the cybersecurity market and the cybersecurity industry.

States remain broadly supportive of a cybersecurity grant program, especially as the COVID-19 pandemic has forced government employees to work from home.

Implementing foundational cybersecurity best practices provides peace of mind when moving to the cloud, ensuring that organizations start and stay secure.

1 2 3 17