CIS Logo
tagline: Confidence in the Connected World

Discover how CIS is mapping the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.

Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.

In October 2019, malware utilizing initiation vectors accounted for the greatest number of alerts in the Top 10 Malware list.

Hear from Senior VP Tony Sager who represented CIS and accept the “Founders Award for National Cyber Defense Leadership” at Minnesota’s annual event. 

Join the CIS team at AWS re:Invent from December 2-6 in Las Vegas for the latest in cybersecurity trends and cloud technologies.

This blog post will highlight the development process for establishing a cyber hygiene program and help identify a program that works for your organization.

CIS released new CIS Benchmarks and CIS Hardened Images for both Microsoft Windows Server 2019 and Red Hat Enterprise Linux 8.

Leverage CIS-CAT Pro assessment capabilities with CIS Benchmark coverage and reduced network usage for better cyber defenses.

Discover how the team at CIS and our partners worked to improve cybersecurity during 2019’s National Cybersecurity Awareness Month.

The Top 10 Malware variants for September closely resemble those of the previous month with the exception of Bifrose and CryptoWall.

11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.

Learn how you’re affected by data breaches and discover the best practices that can help defend your organization against them.

Learn more about how adding CIS Hardened Images to NGINX environments allows you to enjoy security without sacrificing computational efficiency. 

With CIS Hardened Images you can have peace of mind knowing your employees are working in an environment that is built to defend against cyber threats.

Cybersecurity relies on specialists of every kind to achieve success. It takes a team in order to avoid the pitfalls of cyber vulnerabilities and attacks.

1 2 3 4 18