CIS Benchmarks and CIS Hardened Images take the guesswork out of fulfilling your portion of the Cloud Security Shared Responsibility Model.| CIS
These CIS Benchmarks are no longer being reviewed and updated by our consensus communities, but you are still welcome to download them. AIX v1.0.1 – Version 1.0.1 – 2005 Apache Web Server 2.2.0 – Version 2.2.0 – November 2008 Apple iPhone OS 2.2.1 – Version 1.1.0 – March 2009 Check Point Firewall v1.0 – Version 1.0 – […]| CIS
Malicious actors release login credentials from compromised databases. Learn how to secure your login credentials with these simple tips from MS-ISAC.| CIS
CIS Benchmarks help you safeguard systems, software, and networks against today's evolving cyber threats.| CIS
We assess apps owned by the People’s Republic of China (PRC) and the potential threat posed to users. Does the PRC leverage these apps for data collection and influence operations?| CIS
CIS' Executive VP highlights how SCAP 2.0 can help achieve true security automation and improved security business practices.| CIS
The CIS Critical Security Controls organize your efforts of strengthening your enterprise's cybersecurity posture. Get to know the Controls today!| CIS
CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats.| CIS
The Business Resiliency Working Group have developed these tabletop exercises to help cybersecurity teams develop tactical strategies for securing their systems.| CIS
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Office.| CIS
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Microsoft Intune for Microsoft Windows.| CIS
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for AlmaLinux OS.| CIS
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Apple macOS.| CIS
Download our step-by-step checklist to secure your platform: An objective, consensus-driven security guideline for Kubernetes.| CIS