×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Learn key practices to protect cloud workloads when using VMs, endpoints, or containers. And, consider the best means for building a fruitful feedback loop.


The announcement reinforces the company’s commitment to its ecosystem approach, and in helping customers extract maximum value from the TrueFort platform.


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


Digital password managers are generally a secure way to keep track of the dozens of passwords you should have.


These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.


Smart cities leverage technology in new and advanced ways – but at what security cost? Read on for essential cyber defense for smart cities.


A single phishing campaign can bring in millions. Learn how you can spot phishing emails and avoid putting your organization at risk of a cyber-attack.


Senator Schumer said that he will push for cybersecurity legislation in the upcoming federal budget to provide funds for local boards of elections.


Some argue paying the hackers in bitcoins is a good option because it’s cheaper to pay the attacker, rather than spend a small fortune to rebuild an entire computer system.


Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.


By reminding your employees of these simple online safety best practices, your organization can avoid becoming the next victim of a cyber-attack.


Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.


Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.


Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.


East Greenbush, NY April 17, 2019 CIS® (Center for Internet Security, Inc) announced today that it had been named a 2019 Top Workplace among



1 2 3 4