CIS Logo
tagline: Confidence in the Connected World


Discover how OVAL and Joval help protect organizations against cyber vulnerabilities.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Bridge that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Autodesk FBX-SDK library, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.


Perhaps you need a new security mindset – one that can focus your resources on what really matters. Start looking at security from the inside out.


State and local governments confront multiple technology security issues as they deal with proliferating attacks and a disease-transformed work environment.


This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.


In March 2020 the Top 10 Malware composition was fairly consistent with February 2020 with the exception of Pushdo and Tinba.


Multiple vulnerabilities in the Cisco Webex Network Recording Player and Cisco Webex Player could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Anti-virus software has become a must-have computer program, and cybersecurity has become a multidisciplinary industry fighting an evolving threatscape.


The rise in attempted cyberattacks have spurred clients to seek legal advice. The legal advice they're getting is to practice good cyber hygiene.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



1 2 3 4 5 6 122