Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

CIS recently released the CIS Risk Assessment Method v2.0, an information security risk assessment method to help enterprises justify investments for reasonable implementation of the CIS Critical Security Controls (CIS Controls)

CIS's own Tony Sager speaks on the general notion is that a lack of good cyber hygiene is at the heart of most cyber-attacks.

CIS's own Tony Sager is a guest on the Defense in Depth podcast talking about recruiting and whether there is a lack of industry applicants, or employers don’t know how to find them.

Learn more about how adding CIS Hardened Images to NGINX environments allows you to enjoy security without sacrificing computational efficiency.

The MS-ISAC observed Shlayer and CoinMiner leading the top 10 (which comprise of 74% of total activity) with Zloader making its first appearance.

Multi-factor authentication (MFA) solutions are often considered to provide a higher level of protection against attacks. There are numerous solutions to choose from.

CIS Chief Product Architect discusses how the Open Security Alliance helps enable the cooperative ecosystem.

Join the CIS and the MS-ISAC at the Virtual 11th Annual Cyber Security Summit on October 25-27.

Philippe Langlois co-author of the Verizon DBIR joins the podcast in celebration of Cybersecurity Awareness Month to discuss why the DBIR and CIS Community Defense Model (CDM) provide a more holistic picture of cybersecurity.

CIS is launching CIS Endpoint Security Services (ESS), our new, fully-managed endpoint protection solution for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.

Do the words Zombiebots, Gh0st, Beast, and Creeper send shivers up your spine? This infographic offers sweet tools to protect against cyber threats.

CIS Controls, now CIS Critical Security Controls, Tony Sager, CIS Senior Vice President and Chief Evangelist explains why.

Events from the MS-ISAC and FireEye to help you protect your organization against ransomware.

CIS provides resources to help organizations meet their portion of the shared cloud security responsibility model on the AWS Cloud.

View the recently updated CIS Benchmarks for Microsoft Windows Server, VMware ESXi, Amazon Linux and more.

1 2 3 4 5 26