x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in SiemensSolid Edge, the most severe of which could allow an attacker to cause an arbitrary code execution.



This year’s CDM findings strongly reinforce the value of a relatively small number of well-chosen and essential defensive steps found in IG1.


Join leaders from CIS for a C-level roundtable discussion on CIS Endpoint Security Services (ESS), a fully-managed and monitored endpoint protection solution for SLTTs


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



In this webinar, attendees can learn about CIS Endpoint Security Services (ESS), a fully-managed and monitored endpoint protection solution for SLTTs


Download the Community Defense Model (CDM) v2.0 to design, prioritize, implement, and improve your cybersecurity program against the most prevalent types of attacks.


The Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program based on currently available threat data from industry reports.


The model shows that the CIS Controls defend against approximately 86% of all ATT&CK (sub-)techniques found in the MITRE ATT&CK® framework.


Learn how to improve your organization’s cyber defenses by remotely assessing endpoints with CIS-CAT Pro.


Multiple vulnerabilities have been discovered in Microsoft Edge, the most severe of which could result in remote code execution.



In this podcast, learn why vendors and consultants should offer software with built-in cybersecurity as a safer alternative to updating vulnerabilities with patches.


A vulnerability has been discovered in SonicWall SMA100 Series that could allow for arbitrary file deletion.



The episode has been a reminder that there’s much work ahead for the Elections Infrastructure Information Sharing and Analysis Center.


A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



1 2 3 4 5 101