Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

381 - 390 of 547 results
Vulnerabilities in Thunderbird Email Client Allow Code Execution
Published on 06.14.2019
Security updates for the Thunderbird email client address vulnerabilities that could be exploited to execute arbitrary code on impacted systems.

92% of Companies Anticipate Going Cloud-Native by 2021
Published on 06.13.2019
Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.

Balancing Online Services with Cybersecurity Concerns
Published on 05.31.2019
Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.

Microsoft Introduces ElectionGuard SDK Ahead of 2020 Elections
Published on 05.23.2019
ElectionGuard, was designed to enable end-to-end verification of elections, and allow voters and third-party organizations to verify election res...

Addressing Configuration Controls within Cybersecurity Frameworks
Published on 05.22.2019
Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.

Emotet Wreaks Havoc in Healthcare Systems
Published on 05.14.2019
Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.

Cyber Convergence Accelerates, But Not Without Challenges
Published on 05.08.2019
Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.

Flaw in Columbia, S.C., Website Search Tool Exposed Database, SMPT Server Passwords
Published on 04.26.2019
The MS-ISAC brings expertise to local governments facing cybersecurity challenges and security flaws such as exposed server passwords.

CSO Online Highlights CIS Controls as Resource to Achieve GDPR Compliance
Published on 04.23.2019
California uses a checklist of security controls created by CIS to ensure that they are following the state's data security compliance laws.

Managed Vulnerability Management
Published on 04.16.2019
Any strong cybersecurity program should also include a strong and continuous vulnerability management plan. Vulnerability Management goes beyond ...

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events