Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Maintaining an accurate inventory of software helps eliminate potential employee distractions – it can also prevent potential legal and security risks.

Learn more about the CIS Controls volunteer team of James and Kelli Tarala, two of our most dedicated and loyal volunteers.

Learn what’s new and what has changed in the updated CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark v 1.0..

In this blog, John M. Gilligan, Chairman and Interim Chief Executive Officer at CIS explains the importance of protecting infrastructure from cyber attacks.

The cybersecurity industry is growing at a blistering pace. This blog shares insight from an industry veteran on how to start a career in cybersecurity.

Week 4 of National Cyber Security Awareness Month focuses on the growing cybersecurity job market. Learn why you should join the cybersecurity industry.

CIS was honored by the Information Systems Security Association (ISSA)® in October 2017 at the ISSA International Conference in San Diego.

This week for National Cyber Security Awareness Month we focus on some tips to keep yourself secure in this connected world.

As technology blurs the line between the professional and the personal, it’s more important than ever that workplaces develop a culture of cybersecurity.

This blog post shares tips to help you can protect your personal information and avoid becoming a cyber criminals next victim.

CIS Hardened Images are virtual images hardened in accordance with the CIS Benchmarks to secure configurations in the cloud.

Data breaches, like Equifax, reflect a cultural and technological problem. CIS Controls show the actions that must be implemented to provide basic security.

The Center for Internet Security now offers CIS Hardened Images on Microsoft Azure. Learn about all the benefits of switching.

The updated CIS-CAT Pro has two components: CIS-CAT Pro Assessor and CIS-CAT Pro Dashboard. CIS-CAT Pro has the ability to assess individual CIS Benchmarks.

CIS has now made it easy for you to verify that you’re using the latest released Amazon Machine Image (AMI) for a particular CIS Benchmark.

1 18 19 20 21 22