CIS Logo
tagline: Confidence in the Connected World


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


Any device that connects to the internet is vulnerable and could become compromised. Read on to learn how to 10 tips to securely configure devices.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Xcode, watchOS, Safari, iOS, iPadOS, macOS, and tvOS.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



In October 2019, malware utilizing initiation vectors accounted for the greatest number of alerts in the Top 10 Malware list.


Hear from Senior VP Tony Sager who represented CIS and accept the “Founders Award for National Cyber Defense Leadership” at Minnesota’s annual event. 


Join us on December 10 at 3 PM EDT to hear from the CIO of Colville Tribes as he discusses hybrid AI and HI Security Operations Center.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



While it’s clear that businesses are after your dollars during the holidays, you should be aware that cybercriminals are on the lookout, too.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



1 2 3 70