CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



CIS Controls V7 Poster
September 10, 2018
Learn about the basic, foundational, and organizational breakdown of the CIS ControlsV7 along with 5 keys for building a cybersecurity program.


September 2018 Volume13 Issue 09 From the desk of Thomas F Duffy, MS-ISAC Chair Every day as we use our devices, browse the Internet, and open



9/8/2018 GovTech Auditors and CIS President & COO Steve Spano discuss the merits of CIS Risk Assessment (CIS RAM) and the CIS Controls to



Learn how Oklahoma City uses the CIS Controls to address their cybersecurity challenges.


Securing Google Cloud Computing Platform An objective, consensus-driven security guideline for the Google Cloud Computing



What it is Bots are automated applications or scripts designed to perform repetitive tasks without requiring human input Overall, bot activity



This guide is intended as a desk reference for state, local, tribal, and territorial (SLTT) governments in order to provide a basic introduction to



Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to



These winners of the National Cyber Awareness Poster Contest share important cybersecurity tips anywhere you hang



This calendar’s artwork was developed by grade K-12 students who participated in the 2017/2018 MS-ISAC National Cybersecurity Poster Contest.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco products, including Apache Struts running on Cisco products, Cisco SD-WAN Solution, Cisco Integrated Management Controller, Cisco Umbrella API, Cisco RV110W, RV130W, and RV215W Routers, Cisco Webex Meetings Suite (WBS31), Cisco Webex Meetings Suite (WBS32), Cisco Webex Meetings Suite (WBS33), Cisco Webex Meetings, Cisco Webex Meetings Server, Cisco Meeting Server, Cisco Umbrella ERC, Cisco Prime Access Registrar, Cisco Prime Access Registrar Jumpstart, Cisco Prime Collaboration Assurance, Cisco Packaged Contact Center Enterprise, Cisco Data Center Network Manager, Cisco Tetration Analytics, Cisco Network Services Orchestrator, Cisco Enterprise NFV Infrastructure, Cisco Email Security Appliance, Cisco Cloud Services Platform 2100, Cisco Secure Access Control Server.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



CIS RAM is an information security risk assessment method that helps organizations conduct cyber risk assessments to meet requirements standards.


1 18 19 20 21 22 94