CIS Logo
tagline: Confidence in the Connected World


CISOs today face many hurdles in securing a virtual office environment. With many employees working from home, organizations are at risk.


CIS-CAT® configuration assessment tool can now be added directly to pipelines, enabling powerful remote scanning and reporting functionality


The networking devices are a popular choice to support many enterprise networks; researchers have found thousands of such devices connected to the internet.


According to Verizon’s DBIR, Educational Services performed poorly in terms of reporting phishing attacks, losing critical response time for organizations.


Check out the latest CIS Benchmarks releases in June 2020, including Check Point Firewall, Google Kubernetes Engine, and more.


A vulnerability has been discovered in F5 BIG-IP Traffic Management User Interface (TMUI), which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for an attacker gaining administrator privileges.



The CIS Controls are designed to help organizations identify the actions they need to take to defend against most common real-world attacks.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Thunderbird, the most severe of which could allow for remote code execution.



CIS-CAT Pro Assessor v4.0.21 includes configuration assessment evidence in the HTML report and provides an "in-depth" view of an endpoint's state.


Securing Check Point Firewall An objective, consensus-driven security guideline for the Check Point Firewall Network Devices



Washington State Auditor’s Office uses the CIS Controls to perform security audits and improve the security posture of state agencies & local governments.


CIS and CTA will cooperate on threat intelligence, coordinate during cybersecurity emergencies, and collaborate on cybersecurity exercises.


Multiple vulnerabilities have been discovered in Netgear products, the most severe of which could allow for remote code execution.



The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, and more.


1 2 3 125