CIS Logo
tagline: Confidence in the Connected World

The VDBR provides analysis on data breach trends affecting a variety of sectors, including public administration, healthcare, and education.

Malware analysis examines the attributes or behavior of a particular piece of malware often for the purpose of identification, mitigation, or attribution.

The three parts commonly used to divide the web are the Surface Web, the Dark Web, and the Deep Web. 

The CIS Controls™ are a prioritized list of best practices that mitigate common attacks against systems and networks.

Password attacks use of software that expedites cracking or guessing passwords to maliciously authenticate into password-protected accounts.

Blockchains are distributed ledgers that are digitally signed and linked via cryptography and distributed across participants in a peer-to-peer network.

Cryptocurrency is a form of currency that is only available in a digital format. It relies on cryptographic algorithms to record financial transactions.

The NICE Cybersecurity Framework is a reference resource for describing and sharing information about cybersecurity work.

The "Worldwide Threat Assessment" is produced annualy by ODNI and provides an overview of the national security threats facing the United States.

NIST CSF is a set of voluntary standards, guidelines, best practices, and recommendations for managing cybersecurity risk at an organizational level.

A captcha is a challenge-response test to determine if a user is a human. These tests are often based on visual-perception tasks.

Doxing is the malicious identification and online publication of information about an individual. It can include PII or other sensitive content.

Business Email Compromise (BEC) scams attempt to deceive organizations into sending money or sharing PII to a malicious actor.

Backups are a copy of a system or network’s data for file restoration or archival purposes and are essential for data protection and recovery.

Multi-factor authentication is a digital authentication method that requires two or more distinct authentication factors for successful authentication.

1 2 3