URGENT MESSAGE: Log4j Zero-Day Vulnerability Response| Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

The CIS Controls v8 introductory course available on Trailhead offers a 50-minute overview on managing cybersecurity risks using the CIS Controls.

The MS-ISAC produces a monthly report containing end-of-support (EOS) software dates to help organizations reduce risk.

To provide insight into what's in store for the New Year, CIS's team of experts shared their thoughts on a few 2022 cybersecurity predictions.

New CIS Benchmarks have been updated or released for macOS, Google, and Google Chrome.

CIS Hardened Images for macOS 10.15 and 11 are now available in AWS Marketplace. These pre-configured VMs provide an added layer of security to AMIs.

Part 3 and 4 of “Security Guidance for 5G Cloud Infrastructures” offers guidance to achieve integrity and data confidentiality in cloud-hosted environments.

This episode of the CIS Podcast Cybersecurity Where You Are, the team discuss this past year in cybersecurity, creating this podcast, and their favorite episodes.

CIS Controls team releases a guide for the Windows Management Instrumentation (WMI) protocol .

CIS's own Tony Sager, Kathy Boockvar, and Marci Andino discuss the state of election cybersecurity for state and local governments.

In November 2021, the Top 10 stayed consistent with the previous month with the exception of Gh0st, Mirai, and Ursnif, which returned to the Top 10.

New CIS Benchmarks have been updated or released for F5 Networks, macOS, Kubernetes, Red Hat, and Microsoft Azure.

The NSA and CISA published the first two parts of the Security Guidance for 5G Cloud Infrastructures guides. These documents offer cloud security guidance against threat actors.

Subscribe to these podcasts to learn about cybersecurity from the experts.

SANS registration open for security awareness and skills training in the CIS Critical Security Controls with discounts for SLTTs.

CIS CTO Kathleen Moriarty interviews Justin Richer author of "OAuth2 In Action" to discuss authentication, authorization, federation, and related technologies.

1 2 3 26