CIS Logo
tagline: Confidence in the Connected World

The Internet is comprised of two sections: the searchable Internet, sometimes called the “surface web” or “clearnet,” and another network

Overview Whether traveling for business or leisure, travelers face increased cyber targeting and exposure during their trips Key threats include

Overview Cyber threat actors utilize phishing emails to compromise systems and networks and/or gather information using social engineering

Overview In a Tech Support Call Scam, a malicious actor, claiming to work for a well-known technology company, cold-calls victims to convince them

Overview Cyber-criminals target online bank account credentials, as well as information for credits cards and other payment information, with

Overview Malicious actors regularly release login credentials from compromised databases Cyber-criminals can use these credentials in many ways,

Overview: Social media websites serve as platforms for global interaction and the sharing of ideas but are simultaneously a platform frequently

Overview: A Telephony Denial of Service (TDoS) attack is an attempt to make a telephone system unavailable to the intended user(s) by preventing

The CIS Controls are updated and reviewed in collaboration with international cybersecurity experts from various industries, governmental agencies,

This is the Multi-State Information Sharing & Analysis Center's (MS-ISAC) expectations of cyber incidents affecting state, local, tribal, and

The poster artwork for this calendar was developed by K-12 students across the United States who participated in the 2016 MS-ISAC Kids Safe Online

This paper outlines the CIS Community Attack Model - a process to gather lots of relevant real-life information about successful attacks, and

The Japanese translation of the CIS Critical Security Controls for Effective Cyber Defense Translated by NRI SecureTechnologies, Ltd The

CIS Controls Version 60 was translated into Lithuanian and the poster provided by the SANS Council on Cyber Security The Center for Internet

The Privacy Implications Guide is a companion to the CIS Controls V6, which are a set of prioritized best practices designed to protect information

1 4 5 6 7