CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Juniper Junos OS, the most severe of which could allow for denial-of-service conditions.



7/12/2018 State Tech Magazine Article quotes Andrew Dolan, CIS’ Director of Stakeholder Engagement at the Multi-State Information Sharing and



By Sean Atkinson, Chief Information Security Officer, CIS® Resources like the CIS Benchmarks and CIS-CAT Pro help organizations around the world



Multiple vulnerabilities have been discovered in iTunes, iCloud for Windows, Safari, macOS High Sierra, Sierra, and El Capitan, watchOS, tvOS, and iOS.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for arbitrary code execution.



July 2018 Volume13 Issue 07 From the desk of Thomas F Duffy, MS-ISAC Chair This month, in partnership with the National Cyber Security Alliance,



What is it Phishing occurs when malicious actors masquerade as legitimate entities during electronic communication in an attempt to compromise



This past year has been a year of unprecedented growth for CIS Our role as a global, independent leader in cybersecurity for public and



A vulnerability has been discovered in HPE Integrated Lights-Out 4 (iLO 4) servers, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



7/4/2018 IT World Canada Blog suggests Canada infosec leaders should follow the UK’s example on minimum cyber security standards, including the



From data leaks to information theft, security concerns are at an all-time high for organizations around the world CIS offers multiple ways to harden



1 22 23 24 25 26 94