x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



MDBR uses security services from Akamai to proactively look for traffic from domains associated with malicious activity, including ransomware attacks.


There is widespread recognition about the the security shortcomings of enterprise-wide VPN usage, yet there is no clear alternative at the same price point.


Hospitals would be well minded to sign-up for the MDBR service given the increase in threat activity launched against the sector during 2020.


The MDBR service is being offered from CIS with support from Akamai, and can help protect hospital IT systems against ransomware attacks.


CIS's service uses software from the cybersecurity vendor Akamai aimed at proactively identifying, blocking, and mitigating threats.


The service will allow private hospitals to take advantage of additional threat intelligence services from both Akamai and CIS.


Election officials need to be confident that their vendors have assessed and mitigated any risks with their third-party suppliers.


The guide “focuses on the cybersecurity risks involving hardware, firmware, and software that are in the election technology supply chain.


Election systems are vulnerable to the same cyber risks exposed by the SolarWinds hack, the report said.


Cybersecurity expectations are vague, and that has to change if there is any chance of approaching a reasonable amount of cybersecurity.


You finally got your vaccine, and you’re excited to share the proof. Here’s why that may not be a good idea, and what you can do instead.


With talk of cyber Pearl Harbors or digital 9/11s, critical infrastructure cybersecurity might border on alarmism, but there is real reason for concern.


When customers ask for data protection in the cloud, they might mean data security, or data privacy, or both. Both overlap considerably.


The cloud benchmarks vary depending on the provider. But there are a few shared elements between them to enhance your cloud security.


Agencies can leverage Oracle Cloud Marketplace to quickly find and deploy new applications in the cloud to improve operations and better serve constituents.


1 3 4 5 6 7 28