CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



In advance of the 2018 US elections, the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC®) created a new resource to



Following simple online safety best practices can help you avoid becoming the next victim of a cyber attack. Learn simple ways to stay secure at work.


CIS SecureSuite® Members can now customize CIS Benchmarks within the CIS WorkBench platform to meet their specific organizational needs.


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution.



Implementation Classes help organizations classify themselves as belonging to one of three risk profiles to assist in their prioritization efforts.


A vulnerability has been discovered in IBM WebSphere Application Server that could allow for remote code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



There are hundreds of technical jobs in the cybersecurity industry, with hundrends unfilled around the globe. Learn about 11 interesting jobs at CIS.


Multiple vulnerabilities have been discovered in Juniper products, the most severe of which could allow for remote code execution.



The 2017 Nationwide Cybersecurity Review (NCSR) encapsulates the findings of an extensive national survey that measures gaps and capabilities of SLTTs.


The ETSI technical committee CYBER has updated its five-part international compendium of Technical Reports based on the CIS Controls.


To celebrate this week’s theme of 'Educating for a Career in Cybersecurity' during National Cybersecurity Awareness Month (NCSAM), we wanted to get



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



1 19 20 21 22 23 99