CIS Logo
tagline: Confidence in the Connected World


From conducting assessments or evaluating risk, an Information Security Senior Auditor uses analytical skills and a collaborative nature to get the job done.


Beyond configuration settings, a hardened build standard naturally needs to be extended to a software image in terms of installed packages and approved versions, a further key source of vulnerabilities.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



Learn how ransomware threatens SLTT government systems and data, along with some best practices to help prevent an attack.


Multiple vulnerabilities have been discovered in Wind River’s VxWorks Real Time Operating System (RTOS), the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Manage your data, and safely dispose of data you don't need.


The National Association of State Election Directors (NASED) recently honored Nebraska’s Albert sensor work with the inaugural Innovators Award.


CIS Board Member Christopher Painter was honored by the Ambassador of Japan for his work promoting cooperation on cybersecurity between Japan and the U.S.


Multiple vulnerabilities have been discovered in watchOS, Safari, tvOS, iOS, Mojave, High Sierra and Sierra.



NW3C and the MS-ISAC® announced a new cross-sector security partnership that will improve support for SLTT law enforcement agencies.


Nebraska Secretary of State Robert Evnen was awarded an election innovation award presented by the National Association of State Election Directors.


Top 10 Malware activity accounted for 63% of total malware notifications in June 2019 which is a 3 percent increase from May.


CIS has developed the Election Infrastructure Assessment Tool (EIAT), a program to help your agency conduct an election security self-assessment.


This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.


1 22 23 24 25 26 122