x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Referred to as “Billion Dollar Scam” by the FBI, Business Email Compromise (BEC) scammers use a spoofed email to trick employees into transferring money.


The insider poses a threat because the legitimate access they have to proprietary systems discounts them from facing traditional cybersecurity defenses.


Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware.


Distributed denial of service (DDoS) attacks pose a serious problem for healthcare providers who need access to the network to provide proper patient care.


Ransomware is malware that infects systems making them inaccessible until ransom is paid. In the healthcare industry critical processes become inoperable.


October is recognized National Cyber Security Awareness Month (NCSAM) - a collaboration between DHS and the National Cyber Security Alliance.


The Multi-State Information Sharing and Analysis Center (MS-ISAC) is celebrating its 1,000th member – the Village of Boys Town in the state of Nebraska.


Check out this infographic to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.


Becoming an MS-ISAC member is more than just protecting your organization. One of the most valuable benefits of membership is your access to other members.


Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency.


Nemucod is a Trojan that downloads malicious files to an infected computer. According to Symantec, Nemucod was first discovered in December of 2015.


Whether carried out maliciously or simply the result of employee error, learn just how common data breaches are within the public and private sectors.


The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.


Malvertising
April 28, 2016
Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems.


Making Security Happen
February 29, 2016
Our mission is to lead communities to shepherd security best practices and continuously develop world-class security solutions supporting those practices.


1 22 23 24 25