CIS Logo
tagline: Confidence in the Connected World

What will really shape the future of cybersecurity is our collective decision-making about risk, and what we do about it.

Learn more about the 2020 Verizon DBIR and how the Center for Internet Security contributed by sharing best practice expertise.

This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.

CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.

Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.

Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.

Indicator sharing programs allow election offices to maintain visibility into ongoing cyber threats and quickly integrate them into defensive tools.

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.

Tony Sager discusses the way that the COVID-19 pandemic is changing the cybersecurity market and the cybersecurity industry.

Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition.

This is a critical moment for government and corporate America to come together to protect U.S. cyber resources and critical infrastructure.

In April 2020, the MS-ISAC found the Top 10 Malware variants comprised 53% of Total Malware activity, which is up from 42% in March.

Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for session fixation attacks.

States remain broadly supportive of a cybersecurity grant program, especially as the COVID-19 pandemic has forced government employees to work from home.

Implementing foundational cybersecurity best practices provides peace of mind when moving to the cloud, ensuring that organizations start and stay secure.

1 2 3 4 122