CIS Logo
tagline: Confidence in the Connected World


NW3C and the MS-ISAC® announced a new cross-sector security partnership that will improve support for SLTT law enforcement agencies.


Nebraska Secretary of State Robert Evnen was awarded an election innovation award presented by the National Association of State Election Directors.


Top 10 Malware activity accounted for 63% of total malware notifications in June 2019 which is a 3 percent increase from May.


CIS has developed the Election Infrastructure Assessment Tool (EIAT), a program to help your agency conduct an election security self-assessment.


This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.


A strategic partnership between CIS and NNT adds NNT’s Change Tracker Gen7R2 to CIS CyberMarket. NNT will also promote CIS SecureSuite.


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Nebraska’s approach to election security has been recognized and replicated in four states and territories that use the same voter registration system.


The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide helps users secure computers running Microsoft Windows 10 when implementing the CIS Sub-Controls.


A vulnerability has been discovered in JIRA Servers & Data Centers, which can allow for server template injection.



This document contains examples of methods for tracking hardware, software, and sensitive information in an



Learn more about the CIS Controls Microsoft Windows 10 Cyber Hygiene Guide which offers practical guidance on cyber hygiene for Windows 10 users.


The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide offers practical guidance on cyber hygiene for Windows 10 users


A recent update to CIS-CAT Pro Dashboard in v1.1.7 allows for enhanced features such has efficient endpoint search assignments and more.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



1 2 3 99