CIS Logo
tagline: Confidence in the Connected World


The CIS Benchmarks team and Google worked together with the community to develop new security guidance for Chrome.


Catch key takeaways about the future of cloud security from CIS team members who attended AWS Public Sector Summit.


Discover the simple steps elections officials can take to best utilize the resources included in EI-ISAC membership.


Learn how CIS Hardened Images™, part of Authority to Operate (ATO) on AWS, can help your organization stay secure while working in the cloud.


Organizations are deploying a mix of workload server types across hybrid cloud environments. Use of public cloud for applications and infrastructure is growing.


Find out what’s new in CIS-CAT Pro Assessor, including CIS Benchmark™ coverage and the new CIS Controls™ Assessment Module feature.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows 10 environments.


Learn how one of our CIS Controls Community members volunteers his time to improve cybersecurity for organizations around the world.


The top 10 malware activity accounts for 64% of total malware notifications in April, a 7% increase from March. Malspam is the primary initiation vector.


Learn where the CIS team will be speaking about cloud security during AWS Public Sector Summit 2019 in Washington DC.


Conducting your first cyber risk assessment can be intimidating. Learn how any organization can manage risk with CIS RAM.


A Guide for Ensuring Security in Election Procurements helps election officials ensure security is accounted for in their election technology procurements


The top 10 malware activity accounted for 57% of total malware notifications in March, which is a 1% increase from February.


Learn what it's like to help U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis.


1 2 3 14