CIS Logo
tagline: Confidence in the Connected World


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



The CIS STIG Hardened Image maps from an existing version of the CIS RHEL 7 Benchmark. There will be updates a STIG compliant Hardened Image every month.


In October 2019, malware utilizing initiation vectors accounted for the greatest number of alerts in the Top 10 Malware list.


Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a disaster.


CIS Benchmarks Demo
October 1, 2019
Join our monthly demo and learn how the secure configuration guidelines of the CIS Benchmarks can help keep your organization safe & secure.


Hear from Senior VP Tony Sager who represented CIS and accept the “Founders Award for National Cyber Defense Leadership” at Minnesota’s annual event. 


Join us on December 10 at 3 PM EDT to hear from the CIO of Colville Tribes as he discusses hybrid AI and HI Security Operations Center.


Join the CIS team at AWS re:Invent from December 2-6 in Las Vegas for the latest in cybersecurity trends and cloud technologies.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



While it’s clear that businesses are after your dollars during the holidays, you should be aware that cybercriminals are on the lookout, too.


Dealers who aren’t sure where to start, or who want to proactively evolve their IT before they’re forced to, should start with the first five CIS controls.


Organizations that leverage Jamf Protect can now ensure that the configurations of their critical assets align with the CIS Benchmarks.


1 2 3 109