CIS Logo
tagline: Confidence in the Connected World


Cyber threat actors (CTA) leverage interest during public health threats and high-profile events to conduct financial fraud and disseminate malware.


Before establishing a cyber hygiene protocol for your organization, it is important to do an inventory of all of the hardware, software, systems, and applications within the organization.


The EI-ISAC helps the Georgia Secretary of State’s Office and election officials in other states to collect, analyze and disseminate threat data.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


The Ransomware Prevention - Red Team vs Blue Team webinar will highlight the evolution of ransomware, common tactics used, and defensie strategies.


The attacks highlight how vulnerable local jurisdictions remain despite four years of efforts to shore up defenses in preparation for the 2020 presidential election.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Adobe Flash which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



The Center for Internet Security (CIS) is providing recommendations for state and local election offices to invest these funds in cybersecurity initiatives.


Rather than creating a new password every 30, 60 or 90 days, NIST now recommends you avoid frequent changes unless it has been compromised.


Multiple vulnerabilities have been discovered in Cisco Devices, the most severe of which could allow for arbitrary code execution.



Learn how you can catch up with CIS at RSA Conference 2020 and have the opportunity to talk about cybersecurity best practices and more.


1 2 3 114