x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Here are is the why, when, who, what, and where for creating a cybersecurity plan, the first step in starting secure and staying secure.


Whether it is an employee wanting to expand their career or an employer seeking a new hire, soft skills are just as important as technical knowledge.


Join the CIS at booth 209 at AWS Public Sector Summit in Washington, D. C., on September 27-29 at the Walter E. Washington Convention Center.


CIS Controls Internet of Things (IoT) and Mobile Companion Guides for CIS Critical Security Controls v8 was released to support the demand from evolving technology (modern systems and software), threats, and even the changes in the workplace.


Start your cloud migration with CIS Hardened Images. Then your organization can have peace of mind in pre-hardened virtual machine images.


This podcast episode lists the top 5 cybersecurity tips for the family including creating passwords, looking out for malware and more.


The Top 10 Malware variants comprise 63% of the total malware activity in July 2021. Shlayer is likely to continue its prevalence in the Top 10 Malware for the coming quarter.


Email hoaxes attempt to frighten recipients into paying an extortion demand, but can't actually carry out their threats. Here's how to recognize an email hoax.


The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.


Podcast hosts Tony Sager and Sean Atkinson talk about what they like and dislike about the cybersecurity industry.


CIS offers CIS Hardened Images layered with secure Docker containers, including Amazon Linux, Ubuntu Linux, PostgreSQL, and NGINX.


Organizations that must align with regulatory frameworks know that's not easy. Luckily, CIS Benchmarks and Hardened Images can help meet STIG Compliance.


In August 2021 updates were made to a number of CIS Benchmarks for various technologies including Linux, VMware, and more


This podcast episode host Tony Sager and guest Brian de Vallance explain that technology is not wizardry and about government and technical experts working together to create universal cybersecurity policy.


The Mirai botnet began by knocking rival Minecraft servers offline. It has since evolved to infect IoT devices worldwide.


1 2 3 23