CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



With CIS Hardened Images you can have peace of mind knowing your employees are working in an environment that is built to defend against cyber threats.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Defense in Depth (DiD) involves a series of security mechanisms and controls that are thoughtfully layered throughout a computer network.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Cybersecurity relies on specialists of every kind to achieve success. It takes a team in order to avoid the pitfalls of cyber vulnerabilities and attacks.


Pay Us or Else
October 9, 2019
Local governments are being targeted by ransomware at an alarming rate, and very few communities are prepared to deal with the threat.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in iCloud, iTunes, and macOS Catalina.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Smart cities leverage technology in new and advanced ways – but at what security cost? Read on for essential cyber defense for smart cities.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution with root privileges on the affected system.



A single phishing campaign can bring in millions. Learn how you can spot phishing emails and avoid putting your organization at risk of a cyber-attack.


The hacking group, Rancor, sent emails to one Southeast Asian government containing malicious code that looked like legitimate government documents.


Check out six simple tips to discover how to keep your workplace safe online, to improve your organization's cybersecurity defense and minimize risk.


1 2 3 106