×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Cloud Security CIS Cloud Security Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite®
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Secure Your Organization


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Information security governance helps mitigate risk and helps with guidance for security and compliance.


First-of-its-kind offering gives thousands of cybersecurity officials in all 50 states free access to up-to-date cyber threat intelligence.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in VMware vCenter Server, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in SAP products, the most severe of which could allow for remote code execution.



CIS has developed guidance to help enterprises mitigate the risk of attacks on exploitable protocols such as Server Message Block (SMB).


Download this guide for direct mitigations for SMB, as well as which best practices an enterprise can put in place to reduce the risk of an SMB-related attack. 


Seniors and the elderly are often targeted by online scammers. Here's how to protect yourself and your loved ones against cyber crimes and scams.


CIS Benchmarks Demo
June 17, 2021
Join our monthly demo and learn how the secure configuration guidelines of the CIS Benchmarks can help keep your organization safe & secure.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



The new CIS Benchmarks Configuration Certification enables vendors to develop new products with the CIS Benchmarks built in, tested, and certified.


The new CIS Configuration Certification enables vendors to develop new products with the CIS Benchmarks built in, tested, and certified at outset.


CIS Benchmarks have been released and include mappings to CIS Controls v8, including Safeguards and Implementation Groups (IGs).


1 2 3 158