x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



By enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs.


Ransomware attacks continue to be a major cyber threat for organizations of every size. Follow seven steps to help prevent and limit the impacts.


Marion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.


The winners will be honored at an awards dinner at the Albany Hilton on Tuesday, May 5. During the event, the companies will learn where they rank among their size category.


Hear from a few cyber thought leaders at CIS and learn what cybersecurity trends they're expecting to see in the new year.


The Winter 2019 issue of Cybersecurity Quarterly covers everything from how to stop holiday scams to lifting up the new generation of cyber professionals.


Learn key practices to protect cloud workloads when using VMs, endpoints, or containers. And, consider the best means for building a fruitful feedback loop.


The announcement reinforces the company’s commitment to its ecosystem approach, and in helping customers extract maximum value from the TrueFort platform.


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


Digital password managers are generally a secure way to keep track of the dozens of passwords you should have.


These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.


Smart cities leverage technology in new and advanced ways – but at what security cost? Read on for essential cyber defense for smart cities.


A single phishing campaign can bring in millions. Learn how you can spot phishing emails and avoid putting your organization at risk of a cyber-attack.


Senator Schumer said that he will push for cybersecurity legislation in the upcoming federal budget to provide funds for local boards of elections.


Some argue paying the hackers in bitcoins is a good option because it’s cheaper to pay the attacker, rather than spend a small fortune to rebuild an entire computer system.


1 2 3 4