CIS Logo
tagline: Confidence in the Connected World


Implementation of either STIG or CIS Benchmarks can be a challenge if the process isn’t somewhat automated, due to the disparate requirements.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



From conducting assessments or evaluating risk, an Information Security Senior Auditor uses analytical skills and a collaborative nature to get the job done.


Beyond configuration settings, a hardened build standard naturally needs to be extended to a software image in terms of installed packages and approved versions, a further key source of vulnerabilities.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Learn how ransomware threatens SLTT government systems and data, along with some best practices to help prevent an attack.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Wind River’s VxWorks Real Time Operating System (RTOS), the most severe of which could allow for remote code execution.



Manage your data, and safely dispose of data you don't need.


The National Association of State Election Directors (NASED) recently honored Nebraska’s Albert sensor work with the inaugural Innovators Award.


CIS Board Member Christopher Painter was honored by the Ambassador of Japan for his work promoting cooperation on cybersecurity between Japan and the U.S.


Multiple vulnerabilities have been discovered in watchOS, Safari, tvOS, iOS, Mojave, High Sierra and Sierra.



NW3C and the MS-ISAC® announced a new cross-sector security partnership that will improve support for SLTT law enforcement agencies.


1 2 3 4 101