CIS Logo
tagline: Confidence in the Connected World


32 free resources from sources like the Infosec Institute, SANS, CIS, and the FTC to help you develop and improve on your cybersecurity training program.


To understand the utility of integrity monitoring, we might ask ourselves some questions in order to evaluate a network firewall’s configuration.


Deploying the top five CIS Critical Security Controls can reduce up to 90 percent of known pervasive and dangerous cyber-attacks.


As security teams strive to adjust to a new norm for an indefinite period, there are ways to lower the risk associated with WFH environments..


Google has said that the Chrome update will roll out over the coming days and weeks, but you really shouldn't wait for your browser to update automatically.


In 2019, Ryuk was one of the most impactful and most reported ransomware variants in the U.S. State, Local, Tribal, and Territorial government sector.


We need to focus more effort on, because it is where the highest risk of a breach will originate from, is within an organisation.


Employees agencywide are taking part in a telework event Friday that allows leaders to test how prepared their systems and networks are.


The contest is designed to encourage young people to think about online safety, cybersecurity best practices, and cyberbullying.


National security professionals are monitoring efforts to counter cyberattacks and foreign disinformation aimed at Super Tuesday presidential primaries.


Going a step beyond best practices, there is also an ongoing need to verify that systems are in fact operating as intended on a continuous basis.


Krebs attributes the bolstered collaboration between DHS and the NSA to “the 2016 election” and “interference by the Russians."


Organizations need to understand what information on their networks is sensitive, and encrypt it, or don't have it on the network in the first place.


Before establishing a cyber hygiene protocol for your organization, it is important to do an inventory of all of the hardware, software, systems, and applications within the organization.


The EI-ISAC helps the Georgia Secretary of State’s Office and election officials in other states to collect, analyze and disseminate threat data.


1 2 3 4 18