CIS Logo
tagline: Confidence in the Connected World

A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.

In this webinar, attendees will learn how to navigate the Nationwide Cybersecurity Review platform and highlight the benefits of completing the NCSR.

In this webinar, attendees will learn about the Nationwide Cybersecurity Review (NCSR) and how to best utilize it to improve their cybersecurity programs.

In this webinar, CIS' CISO will discuss policy templates and highlight ways to customize them to best suit your organization and increase compliance scores.

Alibaba Cloud Linux 2
August 24, 2019

Securing Alibaba Cloud Linux 2 An objective, consensus-driven security guideline for the Alibaba Cloud Linux 2 Operating Systems

The smallest organizations that need the most help often don’t have dedicated cybersecurity personnel to dedicate to recovery.

Ransomware often spreads through emails containing malicious links or attachments. More than 1,400 ransomware attacks were reported last year.

Hospitals, businesses, and other networks have for years been targets of ransomware attacks. Now, hackers have increasingly focused on local governments.

Cybersecurity is a growing industry. Discover the skills needed to be successful in this industry and resources to help with professional development.

In July 2019, the top 10 malware activity accounted for 66% of total malware activity, a 3% increase over June. Cerber and Brambul activity returned.

CIS Hardened Images for Debian Linux 8 and Debian Linux 9 on three major cloud service providers: AWS, Microsoft Azure, and Google Cloud Platform.

Find out how your U.S. State, Local, Tribal, or Territorial (SLTT) government organization can build a stronger cyber defense program.

Learn how the CIS Benchmarks community developed configuration guidelines for Debian Linux 8 & 9, and how those recommendations are applied in the cloud.

CIS Hardened Images, Amazon Machine Images (AMIs) Configured to CIS Benchmarks, Help Accelerate Compliance.

This webinar highlights Implementation Group 1, which can help enhance cyber hygiene along with how to measure application in Windows 10 environments.

1 3 4 5 6 7 105