CIS Logo
tagline: Confidence in the Connected World


The CIS Controls Cloud Companion Guide provides guidance on how to apply the CIS Controls Version 7 to cloud environments.


Easily track your progress of the CIS Controls Cloud Companion Guide with a downloadable spreadsheet.


Governments are encountering malware designed to steal or mine cryptocurrency or their systems are held for ransom payable only via cryptocurrency.


A business email compromise is a scam that attempts to deceive victims into sending money, or personally identifiable information (PII).


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



Multiple vulnerabilities have been discovered in iOS, Shortcuts for iOS and macOS Mojave.



What are tax scams and how do they happen? Learn about common tax fraud tactics and what to do to protect yourself from these scams.


Discover administrative, technical, and physical security controls along with other strategies to combat the rise of cybercrime.


The "Worldwide Threat Assessment" is produced annualy by ODNI and provides an overview of the national security threats facing the United States.


Smart devices need smart security. Read this blog post to learn how you can keep IoT devices secure.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



NIST CSF is a set of voluntary standards, guidelines, best practices, and recommendations for managing cybersecurity risk at an organizational level.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



1 21 22 23 24 25 108