Showing results 1 - 13 for "solarwinds"
PAGE - https://www.cisecurity.org/solarwinds
The SolarWinds Cyber-Attack: What You Need to Know
Last Updated: March 15, 2021 Executive Overview On December 13, 2020, FireEye announced the discovery of a highly sophisticated cyber intrusion that l...
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/report-highlights-cyber-risks-to-u-...
Report Highlights Cyber Risks to U.S. Election Systems
Election systems are vulnerable to the same cyber risks exposed by the SolarWinds hack, the report said....
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/new-guide-on-election-system-supply...
New Guide on Election System Supply Chains Aids Risk Evaluations
Election officials need to be confident that their vendors have assessed and mitigated any risks with their third-party suppliers....
PRESS RELEASE - https://www.cisecurity.org/about-us/media/press-release/center-for-internet-security-cis-re...
Center for Internet Security (CIS) Releases New Election Technology Cybersecurity Supply Chain Guide
The guide identifies the most common attack types on supply chains and provides an analysis of each election infrastructure component....
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/how-tripwire-can-help-u-s-federal-a...
How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls
Tony Sager feels the CIS Controls reflect a reality in which most organizations are faced with the same kinds of digital threats....
BLOG POST - https://www.cisecurity.org/insights/blog/2022-cybersecurity-predictions-to-watch-out-for
2022 Cybersecurity Predictions to Watch Out For
As eventful as 2020 was, 2021 was equal to its predecessor. It was a year that bounced from hope to cautious optimism, then back to disquiet. While so...
BLOG POST - https://www.cisecurity.org/insights/blog/foundational-security-for-your-software-supply-cha...
Foundational Security for Your Software Supply Chain
We worked with Aqua Security to develop the CIS Software Supply Chain Security Guide using our CIS Benchmarks consensus process....
BLOG POST - https://www.cisecurity.org/insights/blog/commonly-exploited-protocols-server-message-block-...
Commonly Exploited Protocols: Server Message Block (SMB)
The COVID-19 pandemic and the shift to telework environments has changed the way many enterprises do business. The Server Message Block (SMB) protocol...
PODCAST - https://www.cisecurity.org/insights/podcast/cis-podcast-cybersecurity-where-you-are-ep-2
Episode 2: Trends: Then, Now, and Into the Future
Trends: Then, Now, and Into the Future Sean Atkinson and Tony Sager discuss the top cybersecurity issues from 2020 and what the road ahead holds for t...
BLOG POST - https://www.cisecurity.org/insights/blog/the-role-of-service-providers-in-transforming-secu...
The Role of Service Providers in Transforming Security
By: Kathleen M. Moriarty, CIS Chief Technology Officer Cyber-attacks are increasing in severity. Cybercriminals now use the supply chain, management s...
BLOG POST - https://www.cisecurity.org/insights/blog/authentication-and-authorization-using-single-sign...
Authentication and Authorization Using Single Sign-On
By: Kathleen M. Moriarty, CIS Chief Technology Officer In order to prevent credential theft from phishing attacks, there is a push for multi-factor au...
BLOG POST - https://www.cisecurity.org/insights/blog/why-oauth-is-so-important-an-interview-with-justin...
Why OAuth is so Important: An Interview with Justin Richer
This is the third article in this series by Kathleen Moriarty, CIS Chief Technology Officer. In this article, Moriarty interviews Justin Richer, an in...
BLOG POST - https://www.cisecurity.org/insights/blog/2021-cybersecurity-trends-to-prepare-for
2021 Cybersecurity Trends to Prepare For
While few people foresaw the dramatic developments of the past year, CIS experts interviewed in 2020 identified several cybersecurity trends that pers...