CIS Logo
tagline: Confidence in the Connected World


CIS CSAT and CIS RAM are two powerful tools for helping organizations assess cyber risks and improve their security posture.


Learn what the EI-ISAC accomplished in 2018 as it evolved from an idea to a formalized collective of election officials, cybersecurity experts, and more.


Multiple vulnerabilities have been discovered in WordPress, the most severe of which could allow a WordPress author to execute code remotely on the underlying server.



In January 2019, the top 10 malware activity increased 61% from December 2018. This made up 52% of notifications sent, a decrease of 10% from December 2018.


The NICE Cybersecurity Framework is a reference resource for describing and sharing information about cybersecurity work.


Best practices for cybersecurity, such as those outlined in the consensus-based CIS Controls, can safeguard organizations against data breaches.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Call For Public Comments On The Internet Of Things Companion Guide


The Department of Defense released its cloud strategy, laying out how the Pentagon plans to construct its cloud networks.


CIS will network with other industry experts, speak to members, and come back from RSA ready to implement better cybersecurity solutions for all.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe ColdFusion, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



Implement the CIS Controls best practices in cloud environments with a new companion guide, and help us build the next guide for IoT security.


1 20 21 22 23 24 108