Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Cloud Security CIS Cloud Security Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite®
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


Secure Your Organization


filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Information security governance helps mitigate risk and helps with guidance for security and compliance.

CIS has developed guidance to help enterprises mitigate the risk of attacks on exploitable protocols such as Server Message Block (SMB).

The new CIS Benchmarks Configuration Certification enables vendors to develop new products with the CIS Benchmarks built in, tested, and certified.

CIS Benchmarks have been released and include mappings to CIS Controls v8, including Safeguards and Implementation Groups (IGs).

The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2021 to 4/2021.

CIS Benchmarks will now map to CIS Controls v8. Users of CIS-CAT Pro need to download CIS-CAT Pro Assessor v4.7.0 to access the updated CIS Benchmarks.

Introducing the CIS Azure Kubernetes Service (AKS) Benchmark, created in collaboration with CIS' community of cybersecurity experts and Microsoft Azure.

Part 2 of a 2-part series where we discuss first impressions of the CIS Controls v8 launch and feedback from the community.

Many people who use the CIS Benchmarks, like Joseph Testa, ultimately decide to share their knowledge and experience by joining a CIS Benchmarks Community.

In April 2021, CryptoWall, Gh0st, and NanoCore’s return to the MS-ISAC Top 10 Malware list, while BitCoin Miner made its first appearance.

CIS Community Defense Model uses real-world attack technique data from the Verizon DBIR and MITRE ATT&CK to prioritize cybersecurity Safeguards.

The Center for Internet Security (CIS) officially launched CIS Controls v8, which was enhanced to keep up with evolving technology now including cloud and mobile technologies.

This episode, CIS members and guests discuss how the new CIS Controls v8 is not about the list but to keep up with the ever-changing cyber ecosystem.

Here are five reasons why it makes sense for your organization to work in the cloud, and to do so securely using CIS resources such as CIS Hardened Images.

In Amazon Web Services (AWS), there’s a shared security responsibility between AWS and the customer.

1 2 3 27