x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Here are is the why, when, who, what, and where for creating a cybersecurity plan, the first step in starting secure and staying secure.


Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Whether it is an employee wanting to expand their career or an employer seeking a new hire, soft skills are just as important as technical knowledge.


A vulnerability has been discovered in Microsoft MSHTML, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Join the CIS at booth 209 at AWS Public Sector Summit in Washington, D. C., on September 27-29 at the Walter E. Washington Convention Center.


How to identify employees who could become insider threats; that is, they use their authorized access to systems to harm their organization.


CIS Controls Internet of Things (IoT) and Mobile Companion Guides for CIS Critical Security Controls v8 was released to support the demand from evolving technology (modern systems and software), threats, and even the changes in the workplace.


Start your cloud migration with CIS Hardened Images. Then your organization can have peace of mind in pre-hardened virtual machine images.


In its DBIR 2021, Verizon explained that phishing continued its reign as one of the top Action varieties in breaches.


A vulnerability has been discovered in Confluence Server and Data Center, which could allow for arbitrary code execution.



The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Critical Security Controls v8 to IoT devices.


1 2 3 99