CIS Logo
tagline: Confidence in the Connected World

The National Governor's Association announced a partnership to help states and territories mitigate new cybersecurity threats in public and private systems.

Compliance and security issues are a concern as organizations are becoming increasingly reliant on public cloud platforms.

Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.

The Center for Internet Security, Inc. have engaged with Gradifi, to offer financial assistance to CIS employees who have student loan debt.

Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet

CIS releases the CIS Controls Internet of Things Companion Guide

The State and Local Government Cybersecurity Act of 2019 would strengthen funding for cybersecurity coordination with state and local governments.

Learn how your organization can implement CIS Controls for Internet of Things (IoT) devices including smart thermostats, window sensors, and headsets.

Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your process of securing IoT devices.

The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Controls to IoT devices.

Cloud infrastructure is making a difference in the workplace as it helps businesses leverage modern security solutions and flexible computing power.

Learn what you can do to stay cyber-safe when preparing for vacation and how to be secure safely connected throughout your summer trip.

A Cyber Threat Actor (CTA) participates in an action or process that is characterized by malice or hostile action using computers, devices, systems, or networks. 

Key opportunities to learn how to strengthen your cybersecurity in the cloud during AWS re:Inforce 2019 in Boston, MA.

Learn how deploying a hybrid cloud environment allows organizations to effectively maintain tighter security controls over sensitive data and processes.

1 2 3 4 99