Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

One-time passwords can help prevent ID theft, reduce the need for IT support, and help resist cyberattacks called replay attacks.

Because of the complexity of Log4j, it's hard to translate the scope of the vulnerability to policy decision makers or taxpayers.

The K–12 IT environment can be overwhelming and short on resources even without a pandemic-driven burst in remote learning.

Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.

K–12 schools that don’t have a solid approach to preventing and handling cyber incidents can create one — even if they’re understaffed.

The most important action is applying security patches to your OS and applications on your computers, smart phones, and network devices.

CIS is encouraging everyone to act under the assumption that they are impacted, noting the impact these attacks can have.

When it comes to technology plans , state and local government IT leaders are feeling the pinch because of global supply chain delays.

Some policy veterans are raising concern that partnership and collaboration may be taking a backseat to ransomware regulation.

CIS president and CEO John Gilligan and CTO Kathleen Moriarty discuss the group’s current efforts and vision for the future.

Preventing unauthorized devices from gaining access to your network helps ensure the security of hardware devices and assets.

CIS research measures its cybersecurity recommendations’ effectiveness at thwarting the common techniques used in attacks.

CIS has resources available to businesses, municipalities, and governments across the U.S., free of charge.

The past couple years have seen ransomware rise to new heights of disruption, taking cities and critical infrastructure offline.

This “incentivizing” Act is similar to the Ohio Data Protection Act and the Utah Cybersecurity Affirmative Defenses Act.

1 2 3 28