CIS Logo
tagline: Confidence in the Connected World


CIS® fully supports Governor Andrew Cuomo's proposal to enhance statewide election cybersecurity resilience and defend against election disruption.


Security Content Automation Protocols comprise numerous open security standards, and applications which use standards to check systems for vulnerabilities.


In this blog post, our Executive VP, Curtis Dukes, shares his thoughts on network security and the importance of accountability.


This blog post discusses the Top 10 Malware reported to the MS-ISAC in November 2017, highlighting a 41% decrease in Top 10 malware activity.


CIS values all of the volunteers who work hard so that the CIS Benchmarks and CIS Controls reflect global knowledge of the latest known cyber threats.


Follow CIS Controls and our cyber security routine in order to keep you and your organization protected against simple and complex cyber attacks.


Security in the cloud is just as vital as security in on-premises environments. Hardening a system is a way to protect it by reducing vulnerability.


Maintaining an accurate inventory of software helps eliminate potential employee distractions – it can also prevent potential legal and security risks.


Each month the MS-ISAC maps the top 10 malware to common infection vectors, learn about the top 10 malware from October 2017.


This blog addresses the recent outages of some major cloud providers and "The Coming Software Apocalypse". Learn about what you really need to know.


Learn more about the CIS Controls volunteer team of James and Kelli Tarala, two of our most dedicated and loyal volunteers.


Learn what’s new and what has changed in the updated CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark v 1.0..


Check out a few of our highlights from National Cyber Security Awareness Month 2017. Learn more about our campaign for being cyber aware.


Due to high demand, the National Cyber Security Awareness Month (NCSAM) 2017 discount on a new one-year CIS SecureSuite Membership is being extended.


In this blog, John M. Gilligan, Chairman and Interim Chief Executive Officer at CIS explains the importance of protecting infrastructure from cyber attacks.


1 13 14 15 16 17 20