CIS Logo
tagline: Confidence in the Connected World


The CIS Controls ICS Companion Guide will allow the readier to tailor the CIS Controls in the context of a specific IT/OT enterprise.


Overview Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid This is achieved when the ransomware



Learn how the following steps can help organizations deal with a cyber incident Establish Reliable Facts and a Way to Stay Informed Mobilize



Overview The impact of publicly exposed user credentials has far reaching affects, because credential reuse can result in data breaches, system



CIS RAM is an information security risk assessment method that helps organizations implement and assess their security posture against the CIS Controls™.


The CIS Controls are updated and reviewed in collaboration with international cybersecurity experts from various industries, governmental agencies,



The CIS Controls are updated and reviewed in collaboration with international cybersecurity experts from various industries, governmental agencies,



Overview An email bomb is an attack against an email server designed to inhibit the server’s normal function or render it unresponsive, preventing



Overview Typosquatting attempts to take advantage of typographical errors (ie “typos”) introduced by users when URLs are typed directly into the



Malicious cyber threat actors have historically used high-profile events, such as the Olympic Games, to disseminate malware and conduct scams, fraud,



The MS-ISAC shares its predictions for the types of malware, cyber threats, and tactics, techniques, and procedures (TTPs) that will be prevalent in



In an ever-growing mix of hundreds of potential cybersecurity concerns and even more proposed solutions, CIS applies the Pareto Principle – the



Overview State, local, tribal and territorial (SLTT) government employees who choose to shop online while on SLTT government organizational systems



In today's world, almost everything is cyber-related, which means organizations of every size should be aware of the potential vulnerabilities they



This Multi-State Information Sharing and Analysis Center (MS-ISAC) document is a guide to aid partners in their remediation efforts of Distributed



1 2 3 4 5 6