CIS Logo
tagline: Confidence in the Connected World


One area where cities and counties can get better with cybersecurity is by adopting and sticking to a common framework such as the CIS Controls.


Rep. Simmons plans to introduce legislation in the 2021 legislative session to help keep Connecticut safe from cyberattacks.


Download this free guide help make your videoconferencing platoforms like Zoom, WebEx, or GoToWebinar, secure and support basic cyber hygiene.


Web browsers have greatly improved their patching practices around common or popular software applications shrinking the attack surface.


The term “best practice” often comes up in tandem with “cyber hygiene.” CIS defines basic cyber hygiene as CIS Controls IG1.


The toolkit follows best practice recommendations provided by CIS, the UK National Cybersecurity Centre, and the Australia Cybersecurity Centre.


11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.


This partnership is an important step in making foundational cybersecurity more attainable, and addresses the two primary challenges organizations face in achieving basic cyber hygiene.


CIS CSAT Pro v1.1.0 brings new features including visualization of an entire organization tree, exportable graphs, NIST 800-53 mappings, and more.


A definition of basic cyber hygiene provides a technical basis to identify tools, measurements, and reporting used to manage an enterprise's cybersecurity.


This document maps the CIS Controls to the Payment Card Industry Data Security Standard (PCI DSS).


The platform allows researchers to analyze cyber-attacks without sensitive information being released.


Ongoing revisions help organizations map the Controls in meaningful ways, pointing to the recent changes made to map the Sub-Controls to MITRE ATT&CK.


The community defense model highlights the safeguards that show up on any to-do list for cybersecurity and should be implemented by most organizations.


Almost all successful attacks take advantage of conditions that could reasonably be described by most as poor cyber hygiene.


1 2 3 19