Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


Secure Your Organization

Secure Specific Platforms

U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


Secure Your Organization


Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Here are five reasons why it makes sense for your organization to work in the cloud, and to do so securely using CIS resources such as CIS Hardened Images.

In Amazon Web Services (AWS), there’s a shared security responsibility between AWS and the customer.

New CIS Benchmarks released May 2021. These CIS Benchmark releases would not have been possible without the time and support of community contributors.

The Center for Internet Security (CIS) is proud to be participating at the RSA Conference 2021. We hope to see you (virtually) there!

In March 2021, the MS-ISAC observed Blaknight and Danabot’s return to the Top 10, while CopperStealer made its first appearance.

To help organizations meet STIG compliance, the Center for Internet Security (CIS) offers the CIS Benchmarks and CIS Hardened Images mapped to STIGs.

It's not easy to prevent configuration drift. You'll need a management tool that provides the big picture as well as the nitty-gritty.

The 2020 General Election, has been deemed the most secure election in American history. We welcome guests Geoff Hale from the Cybersecurity and Infrastructure Security Agency (CISA), and Lew Robinson serves as CIS Vice President of Election Operations.

Hundreds of security recommendations may exist to harden your Operating Systems (OS) so it is important to use industry recognized guidelines.

The MS-ISAC's CTI team assessed that ransomware groups will continue to leverage stolen data throughout 2021.

Cybersecurity is a team sport, and using the right management tools can make the difference between a winning season or a trip to the showers.

Attestation performed across the full hardware and software stack can be used to provide system level posture assessment.

Mimikatz is also often used in cybersecurity attacks because it can extract plaintext passwords, hashes, pin codes, and Kerberos tickets from memory.

Complying with multiple cybersecurity frameworks can be difficult. Mapping them to your cybersecurity program makes it easier.

In this week’s podcast, hosts Tony Sager and Sean Atkinson discuss tools like CIS Controls, CIS Benchmarks, CIS CSAT and more to strengthen your cyber defense program.

1 2 3 26