Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware.

Distributed denial of service (DDoS) attacks pose a serious problem for healthcare providers who need access to the network to provide proper patient care.

Ransomware is malware that infects systems making them inaccessible until ransom is paid. In the healthcare industry critical processes become inoperable.

October is recognized Cyber Security Awareness Month (CSAM) - a collaboration between DHS and the National Cyber Security Alliance.

The Multi-State Information Sharing and Analysis Center (MS-ISAC) is celebrating its 1,000th member – the Village of Boys Town in the state of Nebraska.

Check out this infographic to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.

Becoming an MS-ISAC member is more than just protecting your organization. One of the most valuable benefits of membership is your access to other members.

Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency.

Nemucod is a Trojan that downloads malicious files to an infected computer. According to Symantec, Nemucod was first discovered in December of 2015.

Whether carried out maliciously or simply the result of employee error, learn just how common data breaches are within the public and private sectors.

The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.

April 28, 2016
Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems.

Making Security Happen
February 29, 2016
Our mission is to lead communities to shepherd security best practices and continuously develop world-class security solutions supporting those practices.

Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability.

1 23 24 25