Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.

By reminding your employees of these simple online safety best practices, your organization can avoid becoming the next victim of a cyber-attack.

Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.

Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.

Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.

East Greenbush, NY April 17, 2019 CIS® (Center for Internet Security, Inc) announced today that it had been named a 2019 Top Workplace among

Any strong cybersecurity program should also include a strong and continuous vulnerability management plan. Vulnerability Management goes beyond compliance.

Connectivity and connected features are changing commercial truck fleet operations.The extensiveness of such connected features increases vulnerabilities.

The Department of Defense released its cloud strategy, laying out how the Pentagon plans to construct its cloud networks.

Critical infrastructure runs through multiple facets of our daily lives, supporting everything from financial transactions to healthcare services.

There are hundreds of technical jobs in the cybersecurity industry, with hundrends unfilled around the globe. Learn about 11 interesting jobs at CIS.

To celebrate this week’s theme of 'Educating for a Career in Cybersecurity' during National Cybersecurity Awareness Month (NCSAM), we wanted to get

1 2 3 4