Media Mentions
CIS in the news! Read industry articles featuring or referring to CIS.
Featured Media Mention
From Cyber to Physical: Tackling Modern Hybrid Threats with John Cohen
John Cohen, CIS Executive Director of the Program for Countering Hybrid Threats, recently spoke with the hosts of “To the Point: Cybersecurity” a...
Read Media Mention381 - 390 of 547 results
Published on 06.14.2019
Security updates for the Thunderbird email client address vulnerabilities that could be exploited to execute arbitrary code on impacted systems.
Published on 06.13.2019
Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.
Published on 05.31.2019
Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.
Published on 05.23.2019
ElectionGuard, was designed to enable end-to-end verification of elections, and allow voters and third-party organizations to verify election res...
Published on 05.22.2019
Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.
Published on 05.14.2019
Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.
Published on 05.08.2019
Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.
Published on 04.26.2019
The MS-ISAC brings expertise to local governments facing cybersecurity challenges and security flaws such as exposed server passwords.
Published on 04.23.2019
California uses a checklist of security controls created by CIS to ensure that they are following the state's data security compliance laws.
Published on 04.16.2019
Any strong cybersecurity program should also include a strong and continuous vulnerability management plan. Vulnerability Management goes beyond ...
Follow Us!
If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]