CIS Logo
tagline: Confidence in the Connected World


The Elections Infrastructure Information Sharing and Analysis Center is the newest member of the National Council of ISACs.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


In this webinar you'll learn how managing security and privacy risk of patients and patient data is mandated by both State and Federal Law.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows 10 environments.


The VDBR provides analysis on data breach trends affecting a variety of sectors, including public administration, healthcare, and education.


Learn how one of our CIS Controls Community members volunteers his time to improve cybersecurity for organizations around the world.


A vulnerability has been discovered in IBM WebSphere Application Server that could allow for remote code execution.



When optimizing cloud environments, CloudCheckr knows that security has to be implemented from the start. That’s why they recommend CIS Hardened Images.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Malware analysis examines the attributes or behavior of a particular piece of malware often for the purpose of identification, mitigation, or attribution.


User name and password are no longer sufficient. Using multi-factor authentication can help reduce the risk of online fraud and identify theft


The top 10 malware activity accounts for 64% of total malware notifications in April, a 7% increase from March. Malspam is the primary initiation vector.


A New York tenth-grader, named Cecilia* has been named the national winner of the CIS and MS-ISAC annual Kids Safe Online Poster Contest.


Multiple vulnerabilities in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Learn where the CIS team will be speaking about cloud security during AWS Public Sector Summit 2019 in Washington DC.


1 2 3 4 94