CIS Logo
tagline: Confidence in the Connected World


NPR September 8, 2017 “The Center for Internet Security reported that over 500 domain names associated with Harvey were registered as the storm



Justice Clearinghouse August 28, 2017 Stacey Wright, MS-ISAC Senior Intel Program Manager, quoted in a Q/A format interview on cyber threats facing



State Scoop August 25, 2017 Molly Gifford, MS-ISAC Programs Manager quoted on the Nationwide Cyber Security Review "It really serves as a



CIO Insight August 14, 2017 “…according to a new report from the SANS Institute, "Integrating Prevention, Detection and Response Workflows,



Tech Target August 2, 2017 "Along with the change management, forensics and auditing, [the technology] allows us to set policies that enable us to



Security Intelligence August 9, 2017 Technical security configuration standards based on industry-recognized practices provide implementation



CISION/PR Newswire August 2, 2017 Qualys media release DefCon highlights includes CIS Benchmark reference: Unveiled CloudView App Framework, which



Intelligent Insurer August 10, 2017 Ryan Spelman, CIS Senior Director quoted on cybersecurity insurance Subscription required to view



FCW August 9, 2017 Curtis Dukes, CIS Executive VP and GM interviewed on malware "We try to balance the risk to the nation and to our allies with



A vulnerability has been discovered for Apache Software Foundation Struts version 2 which could allow for remote code execution.



A vulnerability has been discovered in Red Hat JBoss Enterprise Application Platform (JBoss EAP), which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



1 45 46 47 48 49 91