x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Organizations that must align with regulatory frameworks know that's not easy. Luckily, CIS Benchmarks and Hardened Images can help meet STIG Compliance.


In August 2021 updates were made to a number of CIS Benchmarks for various technologies including Linux, VMware, and more


This podcast episode host Tony Sager and guest Brian de Vallance explain that technology is not wizardry and about government and technical experts working together to create universal cybersecurity policy.


The Mirai botnet began by knocking rival Minecraft servers offline. It has since evolved to infect IoT devices worldwide.


MDBR prevents systems from connecting to harmful web domains, limiting infections related to malware, ransomware, phishing, and other cyber threats.


Begin to implement a Zero Trust strategy using the CIS Controls v8 to improve the security of IT environments as demonstrated over time by reduced attacker dwell time.


escription: In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of total malware activity.


We hope you'll stop by and see us at the upcoming HIMSS Global Health Conference & Exhibition in Las Vegas! We'll be at Booth C365 at Caesar's.


Zero trust is an important information security architectural shift and attestation can provide system-level remediation and resiliency.


With the release of CIS-CAT Pro Dashboard v2.2.0, you can now view individual configuration assessment results by CIS Controls v8, where mappings exist.


Learn more about the new hardened VMs from CIS. They're Windows Server 2019 STIG and Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors.


This month's CIS Benchmark updates and releases for Apple macOS and Microsoft 365 created with the help of our community contributors.


A volunteer community of security experts creates CIS Benchmarks configuration guidelines across 25+ product vendor families.


Recent Day One attacks have demonstrated how difficult it can be for organizations to react when vulnerabilities are announced.


Hospitals in Need of Cybersecurity STAT! This week's episode centers around hospital cybersecurity starting with Malicious Domain Blocking and Reporting.


1 2 3 4 5 24