×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Organizations should operate on the belief that bad guys are already in their system, and should devote efforts towards identifying how to find attackers.


The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.


On April 29, 2016, we released complete rewrites to our CIS Microsoft Windows 7 Benchmark v2.1.0 and CIS Microsoft Windows Server 2008 R2 Benchmark v2.1.0.


Malvertising
April 28, 2016
Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems.


Making Security Happen
February 29, 2016
Our mission is to lead communities to shepherd security best practices and continuously develop world-class security solutions supporting those practices.


In 2015 the MS-ISAC identified around 25 online posts, per month, that contained email addresses and passwords belonging to U.S. government employees.


Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability.


1 24 25 26