CIS Logo
tagline: Confidence in the Connected World


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows environments.


Learn key practices to protect cloud workloads when using VMs, endpoints, or containers. And, consider the best means for building a fruitful feedback loop.


The announcement reinforces the company’s commitment to its ecosystem approach, and in helping customers extract maximum value from the TrueFort platform.


Learn what Remote Desktop Protocol (RDP) is, how misconfigured RDP can be leveraged by cybercriminals, and what to do about it.


The 2018 NCSR provides insight on the level of maturity of state, local, tribal, and territorial information security programs from year to year.


Learn about the latest updates of CIS-CAT Pro that will improve members’ experience using CIS SecureSuite and implementing cybersecurity best practices.


The CIS Benchmarks were downloaded over 1 million times in 2019. They provide security guidance for configuring OS, servers, cloud environments, and more.


Join CIS Benchmarks Communities and work with a global community of IT professionals to continually create, refine, & secure configurations.


And, CIS, an AWS technology partner, announced new benchmarks and hardened images on AWS Marketplace to help cloud customers remain secure.


In November 2019, the Top 10 Malware saw Emotet & TrickBot fall out of the Top 10. The Top 10 variants comprised 57% of total malware activity in November.


Through their implementation of security processes or technology, each person has demonstrated meaningful and measurable advances in security.


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


Any device that connects to the internet is vulnerable and could become compromised. Read on to learn how to 10 tips to securely configure devices.


Discover how CIS is mapping the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 4 5 112