×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



This episode, CIS members and guests discuss how the new CIS Controls v8 is not about the list but to keep up with the ever-changing cyber ecosystem.


In this edition, we’ll look at potential warning signs of a compromised email account, what you can do to recover and help prevent it in the future.


Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration.



Here are five reasons why it makes sense for your organization to work in the cloud, and to do so securely using CIS resources such as CIS Hardened Images.


Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



Learn about what's coming for the new CIS Controls v8 coming May 2021.


Learn about the newly released CIS Controls v8 including its creation, changes from v7, new updates for resources and tools, and more.


Safeguarding public cloud environments is a shared responsibility. Cloud customers should use CIS Benchmarks to ensure cloud security at the account level.


In Amazon Web Services (AWS), there’s a shared security responsibility between AWS and the customer.


Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco SD-WAN vManage Software, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco HyperFlex HX software, the most severe of which could allow for arbitrary code execution.



The primary method of cyberattacks has been unsophisticated spear-phishing campaigns to infect networks with malicious ransomware.


1 2 3 155