x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Cryptocurrency is a form of currency that is only available in a digital format. It relies on cryptographic algorithms to record financial transactions.


The NICE Cybersecurity Framework is a reference resource for describing and sharing information about cybersecurity work.


The "Worldwide Threat Assessment" is produced annualy by ODNI and provides an overview of the national security threats facing the United States.


NIST CSF is a set of voluntary standards, guidelines, best practices, and recommendations for managing cybersecurity risk at an organizational level.


A captcha is a challenge-response test to determine if a user is a human. These tests are often based on visual-perception tasks.


Doxing is the malicious identification and online publication of information about an individual. It can include PII or other sensitive content.


Business Email Compromise (BEC) scams attempt to deceive organizations into sending money or sharing PII to a malicious actor.


Backups are a copy of a system or network’s data for file restoration or archival purposes and are essential for data protection and recovery.


Multi-factor authentication is a digital authentication method that requires two or more distinct authentication factors for successful authentication.


Malware is a malicious software that enters a system via email or suspicious websites.It is designed to perform malicious actions on a device.


Malicious email campaigns attempt to trick a recipient into revealing confidential information, downloading malware, or sending money.


A web attack targets vulnerabilities in websites to gain unauthorized access, obtain confidential information, introduce malicious content, and more.


What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick



What it is Bots are automated applications or scripts designed to perform repetitive tasks without requiring human input Overall, bot activity



Within the information security community, the term hacker does not always have a negative connotation and not all hacking is considered inherently bad.


1 2 3 4