CIS Logo
tagline: Confidence in the Connected World


August 16, 2018 East Greenbush, NY New CIS Controls CISO Risk Matrix Tool Will Help Organizations Compare Themselves with Other Organizations in



8/16/2018 Reuters Elections officials and CIS Executive Chairman John Gilligan discuss how greater us of Albert software in is helping to improve



Learn how the CIS Controls are helping address cybersecurity in policy drafting processes.


Malware activity decreased in July 2018 by 20%, which was driven by the 36% drop in the Top 10 Malware due to its return to normal levels The June



Multiple vulnerabilities have been discovered in Adobe Acrobat and Reader which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



A vulnerability has been discovered in Oracle Database that could allow for complete compromise of the database, as well as shell access to the underlying server.



8/10/2018 InfoSecurity Magazine Article discusses a CIS’ references to a Tripwire study which offers advice on the importance of good cyber



By Chris Cronin, Partner, HALOCK Security Labs CIS RAM (Center for Internet Security Risk Assessment Method), a free tool, provides step-by-step



A vulnerability has been discovered in the Linux Kernel that could allow for Denial of Service (DoS) conditions over any open TCP port.



CIS released CIS RAM (Center for Internet Security Risk Assessment Method) in April 2018 Developed by HALOCK Security Labs in partnership with CIS,



Multiple Vulnerabilities have been discovered in HP Printer products, which could allow for remote code execution.



What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or



Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could result in arbitrary code execution.



1 24 25 26 27 28 99