×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The Mirai botnet began by knocking rival Minecraft servers offline. It has since evolved to infect IoT devices worldwide.


MDBR prevents systems from connecting to harmful web domains, limiting infections related to malware, ransomware, phishing, and other cyber threats.


Malicious Domain Blocking and Reporting available to U.S. public and private hospitals, blocks harmful web domains from accessing hospital IT systems


In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of total malware activity.


We hope you'll stop by and see us at the upcoming HIMSS Global Health Conference & Exhibition in Las Vegas! We'll be at Booth C365 at Caesar's.


In this webinar, SLTT entities can understand the risk and identify the methods and motivations behind insider threats as well as best practices for insider threat monitoring.


Schools are facing these ransomware attacks with poorer cyber defenses than many private companies and far more vulnerabilities that hackers could exploit.


The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.


Many people are working from home instead of commuting. But shared computers and home networks can make you vulnerable to ransomware. Here's what to do.


The guide shares that working with a trusted partner is the most efficient way for agencies to efficiently execute any security strategy.


Hospitals in Need of Cybersecurity STAT! This week's episode centers around hospital cybersecurity starting with Malicious Domain Blocking and Reporting.


The MS-ISAC is revamping the way it collects, analyzes, and disseminates Cyber Threat Intelligence (CTI) to members.


The 2021 Kids Safe Online Activity Book showcases the winning artwork of students from around the country and offers educational games and resources.


This webinar will demonstrate how to collaborate to determine attribution, prosecute the threat actors, and support your recovery operations during a breach.


In May 2021, Quasar returned to the Top 10 Malware. Shlayer is likely to continue its prevalence as organizations move back to an in-person model.


1 2 3 91