CIS Logo
tagline: Confidence in the Connected World


The MS-ISAC shares its predictions for the types of malware, cyber threats, and tactics, techniques, and procedures (TTPs) that will be prevalent in 2018.


The CIS Controls Pareto Principle helps your organizations help prioritize your cyber security actions when they count the most.


The Winter 2017 issue of Cybersecurity Quarterly highlights exploits giving hackers, the keys to unpatched wi-fi and more.


Learn more about the risks associated with online shopping during the holiday season and how to keep your personal information secure.


Learn about two common cybersecurity threats organizations face what steps should be taken to successfully implement a cybersecurity awareness program.


A Denial of Service (DoS) attack is an attempt to make a system unavailable to the intended user(s), such as preventing access to a website.


Check out the 2018 MS-ISAC Cybersecurity Calendar poster artwork created by K-12 students across the US from our Kids Safe Online poster contest.


The Fall 2017 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights new malspam, migrating to the cloud, and more.


This guide empowers owners of small and medium-sized enterprises to help them protect their businesses with the CIS Controls.


This 23-page summary report describes key findings from the 2016 National Cyber Security Review (NCSR) which saw increased participation.


This whitepaper describes how to quickly create a new instance through the Google Cloud Launcher using a CIS Hardened Image.


Cybersecurity Quarterly - Summer 2017 highlights ways phishers have evolved, an ethical hacker's guide to finding hidden assets on a network, and more.


Learn what a SQL injection is and why it is at the top of the CWE/SANS Top 25 Most Dangerous Software Errors list and must be taken seriously.


Cross-site scripting (XSS) vulnerabilities allow a malicious cyber actor to insert and execute unauthorized code in a web application.


MS-ISAC recommendations for securing networks, systems, and the end user, and for responding to a compromise or malicious attack.


1 3 4 5 6 7 8