CIS Logo
tagline: Confidence in the Connected World

TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.

CIS Controls Cloud Companion Guide helps organizations implement security best practices using CIS Controls V7 for phones, tablets, and mobile apps.

Easily track your progress of the CIS Controls Mobile Companion Guide with a downloadable spreadsheet.

Learn what the EI-ISAC accomplished in 2018 as it evolved from an idea to a formalized collective of election officials, cybersecurity experts, and more.

The CIS Controls Cloud Companion Guide provides guidance on how to apply the CIS Controls Version 7 to cloud environments.

Easily track your progress of the CIS Controls Cloud Companion Guide with a downloadable spreadsheet.

Governments are encountering malware designed to steal or mine cryptocurrency or their systems are held for ransom payable only via cryptocurrency.

A business email compromise is a scam that attempts to deceive victims into sending money, or personally identifiable information (PII).

Cyber threat actors (CTAs) use misconfigured Remote Desktop Protocol ports that are open to the Internet to gain network access.

EternalBlue exploits allows cyber threat actors to remotely execute arbitrary code and gain access to a network by sending specially crafted packets.

The Winter 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights 2019 cybersecurity predictions from experts and more.

Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments.

The MS-ISAC recommends that organizations establish a standard for the creation of strong passwords

Cybersecurity is on the minds of most IT professionals these days. Read our CISO's new eBook to learn how to bolster your cyberseucrity poster.

Tabletop exercises are used to help cybersecurity teams develop tactical strategies for securing their systems. Review six scenarios to prepare your team.

1 2 3 4 7