CIS Logo
tagline: Confidence in the Connected World

January 3, 2017 East Greenbush, NY Curt Dukes, former Director of Information Assurance at the National Security Agency (NSA), has been named

A look ahead to which cybersecurity challenges will be prominent in 2017. CIS posted a Twitter poll asking respondents to choose one of four threat areas.

This webinar reviewed the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.

Thanks to the enthusiastic participation from our community members, we have been able to roll out major updates for several CIS Security Benchmarks.

The CIS Controls are updated and reviewed in collaboration with cybersecurity experts in various industries, governmental agencies, & academic institutions.

December 13, 2016

Can this page be generated based on the topics created in the system - if a new "topic" is added, will the page for it be automatically added to the

December 6, 2016 Arlington, VA John Gilligan, the Center for Internet Security's (CIS) Board Chair and Interim CEO, appeared today on a panel

The benchmark is for system and application administrators who plan to develop, deploy, assess, or secure solutions that use Docker 1.6 or later technology.

Phishing continues to be a pervasive cybersecurity issue in an online environment in which over 205 billion emails are sent daily.

Learn which cybersecurity threats MS-ISAC has pinpointed that you should be looking out for in 2017 to protect against cyber incidents.

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in remote code execution.

The poster artwork for this calendar was developed by K-12 students across the U.S. who participated in the 2016 MS-ISAC Kids Safe Online poster contest.

Whether it's a smartphone, laptop, desktop, tablet, or other device, check out these tips to help you protect and secure your personal data.

A vulnerability has been identified in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, which could allow for remote code execution.

EOS occurs when software updates, patches, and other support are no longer offered, resulting in software becoming prone to future security vulnerabilities.

1 101 102 103 104 105 130