CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Cisco products, including Apache Struts running on Cisco products, Cisco SD-WAN Solution, Cisco Integrated Management Controller, Cisco Umbrella API, Cisco RV110W, RV130W, and RV215W Routers, Cisco Webex Meetings Suite (WBS31), Cisco Webex Meetings Suite (WBS32), Cisco Webex Meetings Suite (WBS33), Cisco Webex Meetings, Cisco Webex Meetings Server, Cisco Meeting Server, Cisco Umbrella ERC, Cisco Prime Access Registrar, Cisco Prime Access Registrar Jumpstart, Cisco Prime Collaboration Assurance, Cisco Packaged Contact Center Enterprise, Cisco Data Center Network Manager, Cisco Tetration Analytics, Cisco Network Services Orchestrator, Cisco Enterprise NFV Infrastructure, Cisco Email Security Appliance, Cisco Cloud Services Platform 2100, Cisco Secure Access Control Server.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



CIS RAM is an information security risk assessment method that helps organizations conduct cyber risk assessments to meet requirements standards.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



This week, CIS SecureSuite® Members are receiving an update to CIS-CAT Pro Dashboard CIS-CAT Pro Dashboard is the companion tool to CIS-CAT Pro



Multiple vulnerabilities have been discovered in Joomla!, the most severe of which could allow for arbitrary code execution.



CIS Hardened Images are configured to meet the industry-accepted best practices that are collaboratively developed by aconsensus community. 


To avoid configuration drift in cloud environments, users should regularly deploy a secure, standard image. CIS Hardned Images are one solution.


A vulnerability has been discovered in Apache Struts, which could allow for remote code execution.



Learn how CIS Hardened Images are helping one software and technology firm deliver cloud-based process management solutions to over 300 public and private sector organizations worldwide.


By Sean Atkinson, Chief Information Security Officer It has become a common practice to combine management of different technologies into a single



Within the information security community, the term hacker does not always have a negative connotation and not all hacking is considered inherently bad.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



8/19/2018 Times Union CIS President & COO mentions CIS’ growth one of the reasons a second New York office is being



August 16, 2018 East Greenbush, NY New CIS Controls CISO Risk Matrix Tool Will Help Organizations Compare Themselves with Other Organizations in



1 17 18 19 20 21 92