CIS Logo
tagline: Confidence in the Connected World


Learn how DMARC email authentication, policy, and reporting protocol can help protect an organization from experiencing a phishing attack.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



The guide includes a network security checklist, and also shows users how to map security configurations to the CIS Controls.


Our hardworking CIS Controls team has released a new guide to help teleworkers and small offices implement cybersecurity best practices.


The MS-ISAC doesn’t talk about its members or the work it does for its members. Calkin addressed how his organization might help in hypothetical situations.


Learn how CIS resources can help your organization achieve PCI DSS compliance.


The Telework and Small Office Network Security Guide is meant to assist in securing commodity routers, modems, and other network devices.


A vulnerability has been discovered in Apple iOS, which could allow for arbitrary code execution.



A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



In this webinar, attendees will learn how to navigate the Nationwide Cybersecurity Review platform and highlight the benefits of completing the NCSR.


In this webinar, attendees will learn about the Nationwide Cybersecurity Review (NCSR) and how to best utilize it to improve their cybersecurity programs.


In this webinar, CIS' CISO will discuss policy templates and highlight ways to customize them to best suit your organization and increase compliance scores.


Alibaba Cloud Linux 2
August 24, 2019

Securing Alibaba Cloud Linux 2 An objective, consensus-driven security guideline for the Alibaba Cloud Linux 2 Operating Systems



The smallest organizations that need the most help often don’t have dedicated cybersecurity personnel to dedicate to recovery.


1 2 3 4 103