CIS Logo
tagline: Confidence in the Connected World


Hospitals, businesses, and other networks have for years been targets of ransomware attacks. Now, hackers have increasingly focused on local governments.


Cybersecurity is a growing industry. Discover the skills needed to be successful in this industry and resources to help with professional development.


In July 2019, the top 10 malware activity accounted for 66% of total malware activity, a 3% increase over June. Cerber and Brambul activity returned.


CIS Hardened Images for Debian Linux 8 and Debian Linux 9 on three major cloud service providers: AWS, Microsoft Azure, and Google Cloud Platform.


Organizations rely on different cybersecurity products and services to help bolster their defenses By comparing available services with best



Learn how the CIS Benchmarks community developed configuration guidelines for Debian Linux 8 & 9, and how those recommendations are applied in the cloud.


CIS Hardened Images, Amazon Machine Images (AMIs) Configured to CIS Benchmarks, Help Accelerate Compliance.


This webinar highlights Implementation Group 1, which can help enhance cyber hygiene along with how to measure application in Windows 10 environments.


Senator Schumer said that he will push for cybersecurity legislation in the upcoming federal budget to provide funds for local boards of elections.


Learn how your organization can leverage CIS Build Kits to quickly implement secure configurations, limiting your organization’s cyber vulnerabilities.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Photoshop CC, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



EI-ISAC analysts work with trusted affiliates to conduct research and gather intelligence about cyber threats targeting elections or elections-affiliated systems.


The top concern raised by chief information security officers has been the lack of cybersecurity budget or funding, according to NASCIO reports.


1 2 3 101