Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Tony Sager feels the CIS Controls reflect a reality in which most organizations are faced with the same kinds of digital threats.

This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, providing a safe harbor from certain claims.

The California IoT Law does not define the term “reasonable” as it relates to device security; it does provide some guidelines though.

Basic cyber hygiene or a lack thereof, can mean the difference between a thwarted or successful cyber-attack against your organization.

The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security.

Connecticut might soon follow Ohio and Utah by enacting a law that offers liability protection against ransomware and other cyberattacks.

The Missouri House bill also requires local election authorities to be members of the Center for Internet Security's EI-ISAC.

The frameworks laid out in the bill are well recognized in the cybersecurity community, including NIST, CIS, ISO, and IEC.

The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense.

Information security trends in play offer an opportunity to pivot in order to reduce the resource demands of current security solutions and architectures

Microsoft has turned security offerings into a significant source of revenue, with the business generating $10 billion annually.

A recent string of high-profile cyberattacks pushed long-neglected cybersecurity issues to the center of national policy discussions.

F5 BIG-IP networking devices are popular across industries and are used by most large organizations, including many major cloud service providers.

State and local governments need to be more proactive; sharing information about cybersecurity problems they encounter is important.

Colorado’s PAM strategy is one aspect of a cybersecurity program that follows “good hygiene." Tracking and evaluating hygiene leads to benchmarking.

1 2 3 4 5 6 28