x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



CIS's differentiator is trust in our controls and benchmarks that provide assurance that systems and applications are as expected.


Identfying the five trends of internet security, discussing evidence of change, examples of architectural patterns that scale, and a possible future state.


Tony Sager highlights some of the accomplishments CIS has made over the past 20 years for creating confidence in the connected world.


CIS Build Kits are customizable, automated, and efficient, resources applied via Windows and Linux (Unix,*nix) environments.


The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of CIS, working together to fight cybercrime, and much more.


Updated prescriptive guidance for establishing a secure configuration posture for Amazon, Oracle, Apple iOS, Oracle, as well as new CIS Build Kits.


Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.


IBM brings hybrid cloud leadership together with quantum and security research expertise to stay at the forefront of quantum cybersecurity.


The report recommends organizations that use RDP to make sure they’re implementing CIS’s recommendations for a secure remote environment.


The guide leverages best practices from the CIS Controls and secure configuration recommendations from the CIS Benchmarks.


The threat is exacerbated by the volume of data generated during the online shopping season, especially given consumer reluctance to shop in-person.


CIS harnesses the power of collaboration from a community of cybersecurity experts to safeguard public and private organizations against cyber threats.


Implementing foundational cloud security systems to harden environments protect against cyber-attacks and misconfiguration.


The Center for Internet Security (CIS) is celebrating 20 years making the connected world a safer place for people, businesses, and governments worldwide.


Tanium and CIS work in collaboration to educate and empower agencies with the right tools to solve their most challenging cybersecurity



1 2 3 4 5 6 13