CIS Logo
tagline: Confidence in the Connected World

Learn about two common cybersecurity threats organizations face what steps should be taken to successfully implement a cybersecurity awareness program.

A Denial of Service (DoS) attack is an attempt to make a system unavailable to the intended user(s), such as preventing access to a website.

Check out the 2018 MS-ISAC Cybersecurity Calendar poster artwork created by K-12 students across the US from our Kids Safe Online poster contest.

The Fall 2017 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights new malspam, migrating to the cloud, and more.

This guide empowers owners of small and medium-sized enterprises to help them protect their businesses with the CIS Controls.

This 23-page summary report describes key findings from the 2016 National Cyber Security Review (NCSR) which saw increased participation.

This whitepaper describes how to quickly create a new instance through the Google Cloud Launcher using a CIS Hardened Image.

Cybersecurity Quarterly - Summer 2017 highlights ways phishers have evolved, an ethical hacker's guide to finding hidden assets on a network, and more.

Learn what a SQL injection is and why it is at the top of the CWE/SANS Top 25 Most Dangerous Software Errors list and must be taken seriously.

Cross-site scripting (XSS) vulnerabilities allow a malicious cyber actor to insert and execute unauthorized code in a web application.

MS-ISAC recommendations for securing networks, systems, and the end user, and for responding to a compromise or malicious attack.

Web applications are database driven in order to store user preferences, personally identifiable information, and other sensitive user information.

Learn through an infographic on just how far CIS has taken the CIS Controls through upgrading and advancing over the past few years.

Check out the 2016/2017 artwork from the K-12 contest winners of our annual Kids Safe Online poster contest for National Cyber Security Awareness Month.

This guide contains cybersecurity initiatives, along with detailed recommendations that IT professionals can reference in their organizations or business.

1 5 6 7 8 9