Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Password attacks use of software that expedites cracking or guessing passwords to maliciously authenticate into password-protected accounts.

Blockchains are distributed ledgers that are digitally signed and linked via cryptography and distributed across participants in a peer-to-peer network.

Cryptocurrency is a form of currency that is only available in a digital format. It relies on cryptographic algorithms to record financial transactions.

The NICE Cybersecurity Framework is a reference resource for describing and sharing information about cybersecurity work.

The "Worldwide Threat Assessment" is produced annualy by ODNI and provides an overview of the national security threats facing the United States.

NIST CSF is a set of voluntary standards, guidelines, best practices, and recommendations for managing cybersecurity risk at an organizational level.

A captcha is a challenge-response test to determine if a user is a human. These tests are often based on visual-perception tasks.

Doxing is the malicious identification and online publication of information about an individual. It can include PII or other sensitive content.

Business Email Compromise (BEC) scams attempt to deceive organizations into sending money or sharing PII to a malicious actor.

Backups are a copy of a system or network’s data for file restoration or archival purposes and are essential for data protection and recovery.

Multi-factor authentication is a digital authentication method that requires two or more distinct authentication factors for successful authentication.

Malware is a malicious software that enters a system via email or suspicious websites.It is designed to perform malicious actions on a device.

Malicious email campaigns attempt to trick a recipient into revealing confidential information, downloading malware, or sending money.

A web attack targets vulnerabilities in websites to gain unauthorized access, obtain confidential information, introduce malicious content, and more.

What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick

1 2 3 4