CIS Logo
tagline: Confidence in the Connected World


Organizations are deploying a mix of workload server types across hybrid cloud environments. Use of public cloud for applications and infrastructure is growing.


Find out what’s new in CIS-CAT Pro Assessor, including CIS Benchmark™ coverage and the new CIS Controls™ Assessment Module feature.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows 10 environments.


Learn how one of our CIS Controls Community members volunteers his time to improve cybersecurity for organizations around the world.


The top 10 malware activity accounts for 64% of total malware notifications in April, a 7% increase from March. Malspam is the primary initiation vector.


Learn where the CIS team will be speaking about cloud security during AWS Public Sector Summit 2019 in Washington DC.


Conducting your first cyber risk assessment can be intimidating. Learn how any organization can manage risk with CIS RAM.


A Guide for Ensuring Security in Election Procurements helps election officials ensure security is accounted for in their election technology procurements


The top 10 malware activity accounted for 57% of total malware notifications in March, which is a 1% increase from February.


Learn what it's like to help U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis.


Learn how to improve your organization’s cyber defenses by remotely assessing endpoints with CIS-CAT Pro.


Thanks to positive survey responses from CIS employees, we were named a 2019 Top Workplace by the Albany Times Union. Learn how we did it!


CIS Hardened Images are now built on Shielded VMs in Google Cloud for added security and ease of use.


Implementation Groups (IGs) are introduced in CIS Controls V7.1 They are a new prioritization for the CIS Controls, at the Sub-Control level.


Here are six reasons cloud infrastructure makes sense for organizations interested in leveraging modern security solutions and flexible computing power.


1 2 3 4 15