CIS Logo
tagline: Confidence in the Connected World


Ohio’s top elections official will ask a state budgetary panel for about $1.7 million to monitor county boards of elections for potential cybersecurity threats.


This Security Event Primer provides information on general malware operations, IDS event types, requirements, recommendations, and references.


A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands when initiating TLS connections to affected mail servers.



Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google has not provided an estimated time frame for the patch.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Learn how DMARC email authentication, policy, and reporting protocol can help protect an organization from experiencing a phishing attack.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



The guide includes a network security checklist, and also shows users how to map security configurations to the CIS Controls.


Our hardworking CIS Controls team has released a new guide to help teleworkers and small offices implement cybersecurity best practices.


The MS-ISAC doesn’t talk about its members or the work it does for its members. Calkin addressed how his organization might help in hypothetical situations.


Learn how CIS resources can help your organization achieve PCI DSS compliance.


The Telework and Small Office Network Security Guide is meant to assist in securing commodity routers, modems, and other network devices.


A vulnerability has been discovered in Apple iOS, which could allow for arbitrary code execution.



A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



1 19 20 21 22 23 122