CIS Logo
tagline: Confidence in the Connected World


In light of concrete evidence that there was indeed foreign interference in the 2016 Presidential Election, it falls to the states and localities to keep American democratic processes secure.


This year’s overarching message – "Own IT. Secure IT. Protect IT. "– has been designed to encourage proactive behavior, and promote security best practices.


These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote unauthorized access with elevated privileges on the affected system.



A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



With CIS Hardened Images you can have peace of mind knowing your employees are working in an environment that is built to defend against cyber threats.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Defense in Depth (DiD) involves a series of security mechanisms and controls that are thoughtfully layered throughout a computer network.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Cybersecurity relies on specialists of every kind to achieve success. It takes a team in order to avoid the pitfalls of cyber vulnerabilities and attacks.


Pay Us or Else
October 9, 2019
Local governments are being targeted by ransomware at an alarming rate, and very few communities are prepared to deal with the threat.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in iCloud, iTunes, and macOS Catalina.



1 18 19 20 21 22 125