x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Tony Sager feels the CIS Controls reflect a reality in which most organizations are faced with the same kinds of digital threats.


This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, providing a safe harbor from certain claims.


The California IoT Law does not define the term “reasonable” as it relates to device security; it does provide some guidelines though.


Basic cyber hygiene or a lack thereof, can mean the difference between a thwarted or successful cyber-attack against your organization.


The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security.


Connecticut might soon follow Ohio and Utah by enacting a law that offers liability protection against ransomware and other cyberattacks.


The Missouri House bill also requires local election authorities to be members of the Center for Internet Security's EI-ISAC.


The frameworks laid out in the bill are well recognized in the cybersecurity community, including NIST, CIS, ISO, and IEC.


The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense.


Information security trends in play offer an opportunity to pivot in order to reduce the resource demands of current security solutions and architectures


Microsoft has turned security offerings into a significant source of revenue, with the business generating $10 billion annually.


A recent string of high-profile cyberattacks pushed long-neglected cybersecurity issues to the center of national policy discussions.


F5 BIG-IP networking devices are popular across industries and are used by most large organizations, including many major cloud service providers.


State and local governments need to be more proactive; sharing information about cybersecurity problems they encounter is important.


Colorado’s PAM strategy is one aspect of a cybersecurity program that follows “good hygiene." Tracking and evaluating hygiene leads to benchmarking.


1 2 3 4 5 6 28