CIS Logo
tagline: Confidence in the Connected World

2018 Year in Review
June 10, 2019

The 2018 Year in Review covers CIS' advances in cybersecurity via the EI-ISAC®, MS-ISAC®, CIS Benchmarks™, CIS SecureSuite®, CIS Hardened

This white paper highlights the importance of why organizations need to protect their server workloads and containers and how CIS Hardened Images can help.

This Security Event Primer provides information on general DNS operations, IDS event types, requirements for investigation, recommendations, and references.

This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls Version 7.1.

This spreadsheet is a reference document to quickly see the specific changes from Version 7 to Version 7.1 of the CIS Controls.

Discover the Sub-Controls in Implementation Groups that help organizations of different classes focus their security resources.

LockerGoga is a ransomware that creates disruptive effects on industrial and manufacturing firms' networks, resulting in costly production downtime

The Spring 2019 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights the malware traits that dominated in 2018 and more.

In 2018 the MS-ISAC observed six malware variants consistently reach the Top 10 Malware list including Emotet, Kovter, WannaCry, Gh0st, ZeuS, & CoinMiner.

CIS Controls Cloud Companion Guide helps organizations implement security best practices using CIS Controls V7 for phones, tablets, and mobile apps.

Easily track your progress of the CIS Controls Mobile Companion Guide with a downloadable spreadsheet.

Learn what the EI-ISAC accomplished in 2018 as it evolved from an idea to a formalized collective of election officials, cybersecurity experts, and more.

The CIS Controls Cloud Companion Guide provides guidance on how to apply the CIS Controls Version 7 to cloud environments.

Easily track your progress of the CIS Controls Cloud Companion Guide with a downloadable spreadsheet.

Governments are encountering malware designed to steal or mine cryptocurrency or their systems are held for ransom payable only via cryptocurrency.

1 2 3 4 5 9