CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



Password attacks use of software that expedites cracking or guessing passwords to maliciously authenticate into password-protected accounts.


limited excerpt: East Greenbush, NY April 4, 2019 CIS® (Center for Internet Security, Inc) announces substantial enhancements to the CIS Controls™ in the new



Implementation Groups (IGs) are introduced in CIS Controls V7.1 They are a new prioritization for the CIS Controls, at the Sub-Control level.


This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls Version 7.1.


This spreadsheet is a reference document to quickly see the specific changes from Version 7 to Version 7.1 of the CIS Controls.


Discover the Sub-Controls in Implementation Groups that help organizations of different classes focus their security resources.


Here are six reasons cloud infrastructure makes sense for organizations interested in leveraging modern security solutions and flexible computing power.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Discover ways to leverage the newly released CIS Controls Self Assessment Tool to assist in tracking & managing implementation of the CIS Controls.


Standards in SCAP 2.0 can help achieve true security automation and improved security business practices by integrating support into products.


Multiple vulnerabilities have been identified in Magento CMS, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the WordPress Social Warfare Plugin, the most severe of which could allow for remote code execution.



LockerGoga is a ransomware that creates disruptive effects on industrial and manufacturing firms' networks, resulting in costly production downtime


Apache Cassandra
March 29, 2019

limited excerpt: Securing Apache Cassandra An objective, consensus-driven security guideline for the Apache Cassandra Server Software



1 2 3 4 91