CIS Logo
tagline: Confidence in the Connected World


July 2018 Volume13 Issue 07 From the desk of Thomas F Duffy, MS-ISAC Chair This month, in partnership with the National Cyber Security Alliance,



What is it Phishing occurs when malicious actors masquerade as legitimate entities during electronic communication in an attempt to compromise



This past year has been a year of unprecedented growth for CIS Our role as a global, independent leader in cybersecurity for public and



A vulnerability has been discovered in HPE Integrated Lights-Out 4 (iLO 4) servers, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



7/4/2018 IT World Canada Blog suggests Canada infosec leaders should follow the UK’s example on minimum cyber security standards, including the



From data leaks to information theft, security concerns are at an all-time high for organizations around the world CIS offers multiple ways to harden



Learn how Compliance Forge helps organizations adopt the CIS Controls cybersecurity best practices.


June 28, 2018 East Greenbush, NY In an acknowledgement that some operational environments present unique requirements not previously addressed



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



By Adam Montville, Chief Product Architect, CIS The past few years have been an interesting ride within Security Best Practices, the CIS group



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



Multiple vulnerabilities have been discovered in the GNU Binutils and GNU libiberty libraries, which could allow for arbitrary code execution when the user runs the command ‘objdump’.



Corden Pharma, a global contract development manufacturing organization adopts the CIS Controls as their cybersecurity framework. 


1 21 22 23 24 25 93