CIS Logo
tagline: Confidence in the Connected World


One area where cities and counties can get better with cybersecurity is by adopting and sticking to a common framework such as the CIS Controls.


Rep. Simmons plans to introduce legislation in the 2021 legislative session to help keep Connecticut safe from cyberattacks.


Zoom
October 27, 2020

Securing Zoom An objective, consensus-driven security guideline for the Zoom Desktop Software



Common attacks that occur through videoconferencing systems such as Zoom, WebEx, Microsoft Teams, and BlueJeans and how to configure these systems securely.


Download this free guide help make your videoconferencing platoforms like Zoom, WebEx, or GoToWebinar, secure and support basic cyber hygiene.


Wednesday, October 28 | 2:00 PM EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask,



Shlayer returned to the Top 10 Malware after new evidence resulted in it being reclassified as a Trojan Downloader compared to an Adware Dropper.


Puppet Comply Helps Solve New Compliance Risks Amid COVID-19 Felt By Ninety Percent of Companies.


October 23 - UPDATED: Multiple vulnerability has been discovered in Cisco Adaptive Security Appliance and Firepower Threat Defense, which could allow for a denial of service condition.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for arbitrary code execution.



The October 2020 MS-ISAC newsletter discusses the importance of securing a remote office and provides six suggestions to get folks started.


In September 2020, there was a return of three malware and the Top 10 Malware variants composed 87% of Total Malware activity.


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in HP Intelligent Management Center (iMC), the most severe of which could allow for arbitrary code execution.



1 2 3 137