×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Some policy veterans are raising concern that partnership and collaboration may be taking a backseat to ransomware regulation.


CIS president and CEO John Gilligan and CTO Kathleen Moriarty discuss the group’s current efforts and vision for the future.


Multi-factor authentication (MFA) solutions are often considered to provide a higher level of protection against attacks. There are numerous solutions to choose from.


CIS Chief Product Architect discusses how the Open Security Alliance helps enable the cooperative ecosystem.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Join the CIS and the MS-ISAC at the Virtual 11th Annual Cyber Security Summit on October 25-27.


Philippe Langlois co-author of the Verizon DBIR joins the podcast in celebration of Cybersecurity Awareness Month to discuss why the DBIR and CIS Community Defense Model (CDM) provide a more holistic picture of cybersecurity.


CIS is launching CIS Endpoint Security Services (ESS), our new, fully-managed endpoint protection solution for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.


Being able to identify the dangers not only keeps your own information safe, it also prevents it from spreading to others in your network.


Do the words Zombiebots, Gh0st, Beast, and Creeper send shivers up your spine? This infographic offers sweet tools to protect against cyber threats.


A vulnerability has been discovered in iOS and iPadOS, which could allow for arbitrary code execution with kernel privileges.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Preventing unauthorized devices from gaining access to your network helps ensure the security of hardware devices and assets.


1 2 3 4 5 6 105