×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Cloud Security CIS Cloud Security Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite®
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



First-of-its-kind offering gives thousands of cybersecurity officials in all 50 states free access to up-to-date cyber threat intelligence.


Seniors and the elderly are often targeted by online scammers. Here's how to protect yourself and your loved ones against cyber crimes and scams.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2021 to 4/2021.


The contest is open to all K-12 students in all 50 states, the District of Columbia, U.S. territories, tribal nations, and military installations worldwide.


Multiple vulnerabilities have been discovered in VMware Workstation Pro and VMware Horizon Client for Windows that could result in information disclosure.



Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.



In April 2021, CryptoWall, Gh0st, and NanoCore’s return to the MS-ISAC Top 10 Malware list, while BitCoin Miner made its first appearance.


The Center for Internet Security's 2020 Year in Review highlights all the efforts the cybersecurity nonprofit accomplished in its 20th year in business.


A vulnerability has been discovered in Microsoft Windows JET Database Engine that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco HyperFlex HX software, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco SD-WAN vManage Software, the most severe of which could allow for arbitrary code execution.



1 2 3 93