CIS Logo
tagline: Confidence in the Connected World

In July 2019, the top 10 malware activity accounted for 66% of total malware activity, a 3% increase over June. Cerber and Brambul activity returned.

Learn how the CIS Benchmarks community developed configuration guidelines for Debian Linux 8 & 9, and how those recommendations are applied in the cloud.

Learn how your organization can leverage CIS Build Kits to quickly implement secure configurations, limiting your organization’s cyber vulnerabilities.

From conducting assessments or evaluating risk, an Information Security Senior Auditor uses analytical skills and a collaborative nature to get the job done.

The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.

Learn how ransomware threatens SLTT government systems and data, along with some best practices to help prevent an attack.

Top 10 Malware activity accounted for 63% of total malware notifications in June 2019 which is a 3 percent increase from May.

CIS has developed the Election Infrastructure Assessment Tool (EIAT), a program to help your agency conduct an election security self-assessment.

Learn more about the CIS Controls Microsoft Windows 10 Cyber Hygiene Guide which offers practical guidance on cyber hygiene for Windows 10 users.

A recent update to CIS-CAT Pro Dashboard in v1.1.7 allows for enhanced features such has efficient endpoint search assignments and more.

Join the CIS Benchmarks community and become a part of the consensus-development process. Learn more about what roles we’re looking for.

AWS re:Inforce brought together cloud security, identity, and compliance experts. Learn about some of the highlights from the CIS team.

Learn how your organization can implement CIS Controls for Internet of Things (IoT) devices including smart thermostats, window sensors, and headsets.

Key opportunities to learn how to strengthen your cybersecurity in the cloud during AWS re:Inforce 2019 in Boston, MA.

Learn how deploying a hybrid cloud environment allows organizations to effectively maintain tighter security controls over sensitive data and processes.

1 2 3 15