CIS Logo
tagline: Confidence in the Connected World

2016: By The Numbers
January 9, 2017
2016 was a year to remember at CIS. Check out the infographic to see just how much we accomplished together throughout the year.

Thanks to the enthusiastic participation from our community members, we have been able to roll out major updates for several CIS Security Benchmarks.

The benchmark is for system and application administrators who plan to develop, deploy, assess, or secure solutions that use Docker 1.6 or later technology.

Phishing continues to be a pervasive cybersecurity issue in an online environment in which over 205 billion emails are sent daily.

EOS occurs when software updates, patches, and other support are no longer offered, resulting in software becoming prone to future security vulnerabilities.

Some traditional cyber-criminals have seemingly left the art of stealing credit cards and personally identifiable information (PII) for a simpler tactic.

Use our survival guide to make sure you're not putting your personal information at risk while taking advantage of great deals.

Planning to get a head start on your holiday shopping this year? Here are four things you need to know to stay safe while shopping online.

The ultimate goal of CIS Control 5 is to protect your organization’s information and assets from theft and misuse on all devices not just computers.

Week 4 of National Cyber Security Awareness Month focuses on our continuously connected lives in a rapidly developing digital world.

Cybercriminals routinely leverage vulnerabilities and misconfigurations in software, servers, printers, and devices to gain access to systems.

Tech support scams have been around for years: you answer the phone and the person on the other end claims to be working with a well-known tech company.

Configuration management ensures that the software and devices running on the network are current, trusted and secure.

Referred to as “Billion Dollar Scam” by the FBI, Business Email Compromise (BEC) scammers use a spoofed email to trick employees into transferring money.

The insider poses a threat because the legitimate access they have to proprietary systems discounts them from facing traditional cybersecurity defenses.

1 17 18 19 20 21