CIS Logo
tagline: Confidence in the Connected World


Two-Factor Authentication
September 1, 2016
Two-factor authentication is an important layer of defense beyond your password. It decreases your risk of falling victim to a compromise.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in remote code execution.



Learn how levels of government can get smarter on how they respond to cyber threats.


FortiGate firmware (FortiOS) released before Aug 2012 has a cookie parser buffer overflow vulnerability.



Multiple vulnerabilities have been discovered in iOS, the most severe of which could allow for arbitrary code execution.



IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.


In the first half of 2016, MS-ISAC monitored devices generated over 2.76 trillion records for analysis, resulting in over 20,000 actionable alerts.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code, with failed exploit attempts potentially leading to denial of service conditions.



August 18, 2016 East Greenbush, NY The European Telecommunications Standards Institute (ETSI), which produces globally applicable standards for



A vulnerability has been discovered in the Simple Network Management Protocol (SNMP) code of Cisco Firewall products, which could allow for remote code execution.



Check out this infographic to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.


Customer Needs and Expectations The focus of the Magento Enterprise Edition 113 release is performance and scalability The benchmarking results



A vulnerability has been discovered in the Rockwell Automation MicroLogix 1400 Programmable Logic Controller (PLC) Systems that could allow for unauthorized remote access.



A vulnerability has been discovered in vBulletin that could allow for remote code execution.



Becoming an MS-ISAC member is more than just protecting your organization. One of the most valuable benefits of membership is your access to other members.


1 99 100 101 102 103 122