Filters

Filter By13 Results FoundClear Filters
Type

Topic

Showing results 1 - 13 for "solarwinds"

The SolarWinds Cyber-Attack: What You Need to Know
PAGE - https://www.cisecurity.org/solarwinds

The SolarWinds Cyber-Attack: What You Need to Know

Last Updated: March 15, 2021 Executive Overview On December 13, 2020, FireEye announced the discovery of a highly sophisticated cyber intrusion that l...

Report Highlights Cyber Risks to U.S. Election Systems
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/report-highlights-cyber-risks-to-u-...

Report Highlights Cyber Risks to U.S. Election Systems

Election systems are vulnerable to the same cyber risks exposed by the SolarWinds hack, the report said....

New Guide on Election System Supply Chains Aids Risk Evaluations
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/new-guide-on-election-system-supply...

New Guide on Election System Supply Chains Aids Risk Evaluations

Election officials need to be confident that their vendors have assessed and mitigated any risks with their third-party suppliers....

Center for Internet Security (CIS) Releases New Election Technology Cybersecurity Supply Chain Guide
PRESS RELEASE - https://www.cisecurity.org/about-us/media/press-release/center-for-internet-security-cis-re...

Center for Internet Security (CIS) Releases New Election Technology Cybersecurity Supply Chain Guide

The guide identifies the most common attack types on supply chains and provides an analysis of each election infrastructure component....

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/how-tripwire-can-help-u-s-federal-a...

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

Tony Sager feels the CIS Controls reflect a reality in which most organizations are faced with the same kinds of digital threats....

BLOG POST - https://www.cisecurity.org/insights/blog/2022-cybersecurity-predictions-to-watch-out-for

2022 Cybersecurity Predictions to Watch Out For

As eventful as 2020 was, 2021 was equal to its predecessor. It was a year that bounced from hope to cautious optimism, then back to disquiet. While so...

Foundational Security for Your Software Supply Chain blog graphic
BLOG POST - https://www.cisecurity.org/insights/blog/foundational-security-for-your-software-supply-cha...

Foundational Security for Your Software Supply Chain

We worked with Aqua Security to develop the CIS Software Supply Chain Security Guide using our CIS Benchmarks consensus process....

Commonly Exploited Protocols: Server Message Block (SMB)
BLOG POST - https://www.cisecurity.org/insights/blog/commonly-exploited-protocols-server-message-block-...

Commonly Exploited Protocols: Server Message Block (SMB)

The COVID-19 pandemic and the shift to telework environments has changed the way many enterprises do business. The Server Message Block (SMB) protocol...

CIS Podcast: Cybersecurity Where You Are Ep.2
PODCAST - https://www.cisecurity.org/insights/podcast/cis-podcast-cybersecurity-where-you-are-ep-2

Episode 2: Trends: Then, Now, and Into the Future

Trends: Then, Now, and Into the Future Sean Atkinson and Tony Sager discuss the top cybersecurity issues from 2020 and what the road ahead holds for t...

The Role of Service Providers in Transforming Security
BLOG POST - https://www.cisecurity.org/insights/blog/the-role-of-service-providers-in-transforming-secu...

The Role of Service Providers in Transforming Security

By: Kathleen M. Moriarty, CIS Chief Technology Officer Cyber-attacks are increasing in severity. Cybercriminals now use the supply chain, management s...

Authentication and Authorization Using Single Sign-On
BLOG POST - https://www.cisecurity.org/insights/blog/authentication-and-authorization-using-single-sign...

Authentication and Authorization Using Single Sign-On

By: Kathleen M. Moriarty, CIS Chief Technology Officer In order to prevent credential theft from phishing attacks, there is a push for multi-factor au...

CIS
BLOG POST - https://www.cisecurity.org/insights/blog/why-oauth-is-so-important-an-interview-with-justin...

Why OAuth is so Important: An Interview with Justin Richer

This is the third article in this series by Kathleen Moriarty, CIS Chief Technology Officer. In this article, Moriarty interviews Justin Richer, an in...

2021 Cybersecurity Trends to Prepare For
BLOG POST - https://www.cisecurity.org/insights/blog/2021-cybersecurity-trends-to-prepare-for

2021 Cybersecurity Trends to Prepare For

While few people foresaw the dramatic developments of the past year, CIS experts interviewed in 2020 identified several cybersecurity trends that pers...