Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Cloud Security CIS Cloud Security Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite®
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


Secure Your Organization


filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

The MS-ISAC observed a 20% decrease in new malware infections from December 2017 to January 2018. Kovter still dominates the Top 10 with 55% of infections.

Where Risks Meet Controls
February 13, 2018
Learn how the CIS Controls can provide a helpful starting point of evaluating risks associated with an organizations internal security.

In this blog post, our CISO discusses CIS Control 13 and provides guidance for creating a data protection plan that identifies compromising elements.

Learn how CIS can help financial organizations comply with the 23 NYCRR Part 500 cybersecurity regulation.

Response planning is an important aspect of improving cyber defenses.

Starting this year, CIS is making CIS SecureSuite Membership free to state, local, tribal, and territorial (SLTT) governments in the United States

This blog post discusses the Top 10 malware reported by the MS-ISAC in December of 2017, where there was a 23% reduction in Top 10 notifications.

Conducting your first cyber risk assessment can be intimidating. Learn how any organization can manage risk with CIS RAM.

CIS® fully supports Governor Andrew Cuomo's proposal to enhance statewide election cybersecurity resilience and defend against election disruption.

Security Content Automation Protocols comprise numerous open security standards, and applications which use standards to check systems for vulnerabilities.

In this blog post, our Executive VP, Curtis Dukes, shares his thoughts on network security and the importance of accountability.

This blog post discusses the Top 10 Malware reported to the MS-ISAC in November 2017, highlighting a 41% decrease in Top 10 malware activity.

CIS values all of the volunteers who work hard so that the CIS Benchmarks and CIS Controls reflect global knowledge of the latest known cyber threats.

Follow CIS Controls and our cyber security routine in order to keep you and your organization protected against simple and complex cyber attacks.

Security in the cloud is just as vital as security in on-premises environments. Hardening a system is a way to protect it by reducing vulnerability.

1 19 20 21 22 23 27