Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

For December 2021 Cerber, RedLine, and Qakbot. Cerber and Qakbot returned to the Top 10, while RedLine made its first appearance.

This podcast discusses what steps CIS took to address the Log4j vulnerability.

CIS Risk Assessment Method v2.1 for IG2 is designed to help justify investments for reasonable implementation of the CIS Critical Security Controls (CIS Controls).

CIS RAM v2.1 is made up of a family of documents, starting with the bare essentials and additional documents for each Implementation Group.

The CIS Controls v8 introductory course available on Trailhead offers a 50-minute overview on managing cybersecurity risks using the CIS Controls.

The MS-ISAC produces a monthly report containing end-of-support (EOS) software dates to help organizations reduce risk.

To provide insight into what's in store for the New Year, CIS's team of experts shared their thoughts on a few 2022 cybersecurity predictions.

New CIS Benchmarks have been updated or released for macOS, Google, and Google Chrome.

CIS Hardened Images for macOS 10.15 and 11 are now available in AWS Marketplace. These pre-configured VMs provide an added layer of security to AMIs.

Part 3 and 4 of “Security Guidance for 5G Cloud Infrastructures” offers guidance to achieve integrity and data confidentiality in cloud-hosted environments.

This episode of the CIS Podcast Cybersecurity Where You Are, the team discuss this past year in cybersecurity, creating this podcast, and their favorite episodes.

CIS Controls team releases a guide for the Windows Management Instrumentation (WMI) protocol .

CIS's own Tony Sager, Kathy Boockvar, and Marci Andino discuss the state of election cybersecurity for state and local governments.

In November 2021, the Top 10 stayed consistent with the previous month with the exception of Gh0st, Mirai, and Ursnif, which returned to the Top 10.

New CIS Benchmarks have been updated or released for F5 Networks, macOS, Kubernetes, Red Hat, and Microsoft Azure.

1 2 3 26