×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The Center for Internet Security (CIS) officially launched CIS Controls v8, which was enhanced to keep up with evolving technology now including cloud and mobile technologies.


This episode, CIS members and guests discuss how the new CIS Controls v8 is not about the list but to keep up with the ever-changing cyber ecosystem.


Here are five reasons why it makes sense for your organization to work in the cloud, and to do so securely using CIS resources such as CIS Hardened Images.


In Amazon Web Services (AWS), there’s a shared security responsibility between AWS and the customer.


New CIS Benchmarks released May 2021. These CIS Benchmark releases would not have been possible without the time and support of community contributors.


The Center for Internet Security (CIS) is proud to be participating at the RSA Conference 2021. We hope to see you (virtually) there!


In March 2021, the MS-ISAC observed Blaknight and Danabot’s return to the Top 10, while CopperStealer made its first appearance.


To help organizations meet STIG compliance, the Center for Internet Security (CIS) offers the CIS Benchmarks and CIS Hardened Images mapped to STIGs.


It's not easy to prevent configuration drift. You'll need a management tool that provides the big picture as well as the nitty-gritty.


The 2020 General Election, has been deemed the most secure election in American history. We welcome guests Geoff Hale from the Cybersecurity and Infrastructure Security Agency (CISA), and Lew Robinson serves as CIS Vice President of Election Operations.


Hundreds of security recommendations may exist to harden your Operating Systems (OS) so it is important to use industry recognized guidelines.


The MS-ISAC's CTI team assessed that ransomware groups will continue to leverage stolen data throughout 2021.


Cybersecurity is a team sport, and using the right management tools can make the difference between a winning season or a trip to the showers.


Attestation performed across the full hardware and software stack can be used to provide system level posture assessment.


Mimikatz is also often used in cybersecurity attacks because it can extract plaintext passwords, hashes, pin codes, and Kerberos tickets from memory.


1 2 3 4 5 22