CIS Logo
tagline: Confidence in the Connected World

Standards in SCAP 2.0 can help achieve true security automation and improved security business practices by integrating support into products.

Learn what a day in the life of a Principal Software Engineer is like at CIS.

CIS SecureSuite Members have access to new features in CIS-CAT Pro Assessor 3.0.56 and 4.0.4, including security updates and updated profile text.

The MS-ISAC® observed a 13% increase in total malware activity from January 2019 to February 2019 which made up 67% of total malware notifications sent.

It takes three steps and a little tailoring to create a golden image using the CIS Benchmarks secure baseline with CIS SecureSuite.

Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.

The CIS Controls Mobile Companion Guide helps organizations implement security best practices for phones, tablets, and mobile apps.

Learn how every IT team can benefit from implementing golden images with a secure baseline using features included in CIS SecureSuite.

The CIS Controls V7.1 Implementation Groups help organizations with varying resources, expertise, and risk exposure implement security best practices.

Our Stakeholder Engagement team works diligently to build relationships, educate members, and help entities improve their cybersecurity posture.

CIS CSAT and CIS RAM are two powerful tools for helping organizations assess cyber risks and improve their security posture.

In January 2019, the top 10 malware activity increased 61% from December 2018. This made up 52% of notifications sent, a decrease of 10% from December 2018.

Best practices for cybersecurity, such as those outlined in the consensus-based CIS Controls, can safeguard organizations against data breaches.

CIS will network with other industry experts, speak to members, and come back from RSA ready to implement better cybersecurity solutions for all.

Implement the CIS Controls best practices in cloud environments with a new companion guide, and help us build the next guide for IoT security.

1 2 3 4 5 15