CIS Logo
tagline: Confidence in the Connected World


More than 9,000 members of the CIS Benchmarks™ Community have developed and updated CIS Benchmarks for over 150 technologies.


Top 10 Malware August 2018
September 24, 2018
In August 2018, malware activity decreased 20%, a change that was primarily driven by the 26% drop in the Top 10 Malware.


A vulnerability has been discovered in Microsoft Windows JET Database Engine that could allow for remote code execution.



October is National Cybersecurity Awareness Month. Get a deeper dive into NCSAM with members from the MS-ISAC, DHS, and NCSA.


The Chaos Experiment
September 20, 2018
The chaos principles define a method for introducing the unknown into the process of development operations. One helpful strategy is to define the baseline.


Multiple vulnerabilities in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



9/19/2018 EdScoop Article discusses the launch of New York State’s version of MS-ISAC’s Keep Kids Safe Online poster



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Malicious actors leverage public interest during natural disasters and other high profile events in order to conduct financial fraud and disseminate



By Sean Atkinson, Chief Information Security Officer As the world requires more code, more applications, more interfaces, and more digital services,



Multiple vulnerabilities have been discovered in Apple Support for iOS, Safari, watchOS, tvOS, and iOS.



What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick



9/14/2018 Tech Target Security Management blog touts the benefits of the CIS



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



9/12/2018 State Tech Magazine Utah CISO Phil Bates discusses Utah’s partnership with MS-ISAC to improve cybersecurity of the state’s



1 21 22 23 24 25 99