CIS Logo
tagline: Confidence in the Connected World


The Internet is comprised of two sections: the searchable Internet, sometimes called the “surface web” or “clearnet,” and another network



Overview Whether traveling for business or leisure, travelers face increased cyber targeting and exposure during their trips Key threats include



Overview Cyber threat actors utilize phishing emails to compromise systems and networks and/or gather information using social engineering



Overview In a Tech Support Call Scam, a malicious actor, claiming to work for a well-known technology company, cold-calls victims to convince them



Overview Cyber-criminals target online bank account credentials, as well as information for credits cards and other payment information, with



Overview Malicious actors regularly release login credentials from compromised databases Cyber-criminals can use these credentials in many ways,



Overview: Social media websites serve as platforms for global interaction and the sharing of ideas but are simultaneously a platform frequently



Overview: A Telephony Denial of Service (TDoS) attack is an attempt to make a telephone system unavailable to the intended user(s) by preventing



The CIS Controls are updated and reviewed in collaboration with international cybersecurity experts from various industries, governmental agencies,



This is the Multi-State Information Sharing & Analysis Center's (MS-ISAC) expectations of cyber incidents affecting state, local, tribal, and



The poster artwork for this calendar was developed by K-12 students across the United States who participated in the 2016 MS-ISAC Kids Safe Online



This paper outlines the CIS Community Attack Model - a process to gather lots of relevant real-life information about successful attacks, and



The Japanese translation of the CIS Critical Security Controls for Effective Cyber Defense Translated by NRI SecureTechnologies, Ltd The



CIS Controls Version 60 was translated into Lithuanian and the poster provided by the SANS Council on Cyber Security The Center for Internet



The Privacy Implications Guide is a companion to the CIS Controls V6, which are a set of prioritized best practices designed to protect information



1 4 5 6 7