CIS Logo
tagline: Confidence in the Connected World


Learn what it is like to be a Senior Cybersecurity Engineer working on the CIS Controls team at the Center for Internet Security.


Securing the nation’s elections goes beyond the voting machines that are used to cast and tally ballots on Election Day Electronic poll books,



Ransomware attacks continue to be a major cyber threat for organizations of every size. Follow seven steps to help prevent and limit the impacts.


Top 10 Malware variants comprised 48% of total malware activity in December 2019 with fewer infections across almost every Top 10 malware variant.


Hear from a few cyber thought leaders at CIS and learn what cybersecurity trends they're expecting to see in the new year.


CIS CISO, Sean Atkinson highlights 10 cybersecurity practices CISOs can fall prey to and what to do to avoid them in the futuire.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows environments.


Learn about the latest updates of CIS-CAT Pro that will improve members’ experience using CIS SecureSuite and implementing cybersecurity best practices.


The CIS Benchmarks were downloaded over 1 million times in 2019. They provide security guidance for configuring OS, servers, cloud environments, and more.


Join CIS Benchmarks Communities and work with a global community of IT professionals to continually create, refine, & secure configurations.


In November 2019, the Top 10 Malware saw Emotet & TrickBot fall out of the Top 10. The Top 10 variants comprised 57% of total malware activity in November.


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


Discover how CIS is mapping the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.


Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.


In October 2019, malware utilizing initiation vectors accounted for the greatest number of alerts in the Top 10 Malware list.


1 2 3 4 5 20