CIS Logo
tagline: Confidence in the Connected World


Learn how one organization uses the CIS Controls for basic, effective security safeguards across a variety of business units.


August 1, 2018 East Greenbush, NY CIS securely configured operating systems for cloud environments now available for government users CIS



Thursday, August 23 at 2:00 pm EST Breaches and hacks are in the news almost every day Several breaches are a result of common software flaws in



August 2018 Volume13 Issue 08 From the desk of Thomas F Duffy, MS-ISAC Chair We all know it happens – computers crash, malware infects them, or



Overview Spear phishing occurs when cyber threat actors send a targeted electronic communication to an individual or a small group of users, while



Security when working in the cloud is just as important as is on-premises environments. Read on for seven reasons organizations around the world trust CIS Hardened Images to protect their systems and data in the cloud..0..............................................................................


PostgreSQL
July 27, 2018

Securing PostgreSQL An objective, consensus-driven security guideline for the PostgreSQL Server Software



In the presentation, Col. Horvath outlined the importance of cyber hygiene, the catalyst in building CIS Controls, and ongoing work to improve implementation of the Controls.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



7/24/2018 StateScoop Christopher Krebs, the Homeland Security undersecretary in charge of cybersecurity programs, credits CIS’ EI-ISAC for many



The use of virtual images is increasing as more government workloads shift from on-premises to cloud-based environments Virtual images are a



What is it An email bomb is an attack against an email inbox or server designed to overwhelm an inbox or inhibit the server’s normal function,



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



A Practice Note providing an overview of what cyber vulnerability management programs are, how they work, and the key role they play in any



Multiple vulnerabilities have been discovered in Cisco products including Cisco SD-WAN Solution, Cisco Policy Suite, Cisco Finesse, Cisco Cloud Services Platform 2100, Cisco Unified Communications Manager IM and Presence Service, Cisco Unified Contact Center Express (Unified CCX), Cisco Webex, Cisco Webex Teams, Cisco Webex Network Recording Player for Advanced Recording and Webex Recording Format files, and Cisco Nexus 9000 Series Fabric Switches.



1 19 20 21 22 23 92