CIS Logo
tagline: Confidence in the Connected World


Check out the latest releases and upates to the CIS Benchmarks in July 2020.


The CIS Password Policy Guide consolidates password guidance into a single source and provides best practices and recommendations.


Learn about one of the CIS Benchmarks Community Volunteers who generously spends some of his time improving cybersecurity best practices for the community.


Top 10 Malware composition was fairly consistent through May 2020, with the exception of Quasar, SocGholish, and Ursnif.


CIS Chief Evangelist Tony Sager shares insight as to why the CIS Sub-Controls in IG1 are the basis for an action plan for basic cyber hygiene.


Learn about one of the CIS Controls Volunteers who generously volunteers his time to help improve cybersecurity best practices for the community.


CISOs today face many hurdles in securing a virtual office environment. With many employees working from home, organizations are at risk.


Check out the latest CIS Benchmarks releases in June 2020, including Check Point Firewall, Google Kubernetes Engine, and more.


CIS-CAT Pro Assessor v4.0.21 includes configuration assessment evidence in the HTML report and provides an "in-depth" view of an endpoint's state.


The June 2020 CIS Controls Self Assessment Tool (CSAT) Update v1.3.0 includes new features to make the tool easier to use, as well as some bug fixes.


SLTT employees working from home need more cybersecurity awareness training. The SANS Summer Buy Window offers awareness training to SLTTs at a discount.


In April 2020 malspam accounted for the greatest number of alerts. Top 10 Malware composition was fairly consistent the exception of Modi, Mirai, and NSPPS.


CIS Benchmarks and CIS Hardened Images take the guesswork out of fulfilling your portion of the Cloud Security Shared Responsibility Model.


The 2020 Verizon DBIR found that ransomware is on the rise and disproportionately affects the public sector (60% of malware vs. 27% in all sectors).


Learn more about the 2020 Verizon DBIR and how the Center for Internet Security contributed by sharing best practice expertise.


1 2 3 4 21