CIS Logo
tagline: Confidence in the Connected World

The report has some recommendations to keep your digital assets secure based on findings with the Center for Internet Security Critical Security Controls.

The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.

A vulnerability has been discovered in Cisco Unified Contact Center Express which could allow for remote code execution.

Verizon's Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches The information and analysis

What will really shape the future of cybersecurity is our collective decision-making about risk, and what we do about it.

Learn more about the 2020 Verizon DBIR and how the Center for Internet Security contributed by sharing best practice expertise.

This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.

CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.

Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.

Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.

Indicator sharing programs allow election offices to maintain visibility into ongoing cyber threats and quickly integrate them into defensive tools.

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.

Tony Sager discusses the way that the COVID-19 pandemic is changing the cybersecurity market and the cybersecurity industry.

Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition.

This is a critical moment for government and corporate America to come together to protect U.S. cyber resources and critical infrastructure.

1 2 3 4 5 6 124