CIS Logo
tagline: Confidence in the Connected World

Nebraska’s approach to election security has been recognized and replicated in four states and territories that use the same voter registration system.

The National Governor's Association announced a partnership to help states and territories mitigate new cybersecurity threats in public and private systems.

Compliance and security issues are a concern as organizations are becoming increasingly reliant on public cloud platforms.

The State and Local Government Cybersecurity Act of 2019 would strengthen funding for cybersecurity coordination with state and local governments.

Cloud infrastructure is making a difference in the workplace as it helps businesses leverage modern security solutions and flexible computing power.

Security updates for the Thunderbird email client address vulnerabilities that could be exploited to execute arbitrary code on impacted systems.

Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.

By reminding your employees of these simple online safety best practices, your organization can avoid becoming the next victim of a cyber-attack.

Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.

ElectionGuard, was designed to enable end-to-end verification of elections, and allow voters and third-party organizations to verify election results.

Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.

Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.

Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.

The MS-ISAC brings expertise to local governments facing cybersecurity challenges and security flaws such as exposed server passwords.

California uses a checklist of security controls created by CIS to ensure that they are following the state's data security compliance laws.

1 2 3 13