×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Schneider Electric Modicon PLCs, which could result in remote code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



The law takes effect on Oct. 1 and makes Connecticut the third state after Ohio and Utah to provide such incentives for implementing cyber frameworks.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in SolarWinds Serv-U, which could result in remote code execution.



Multiple vulnerabilities have been discovered in Kaseya VSA that could allow for arbitrary code execution.



With the release of CIS-CAT Pro Dashboard v2.2.0, you can now view individual configuration assessment results by CIS Controls v8, where mappings exist.


In this webinar, SLTT entities can understand the risk and identify the methods and motivations behind insider threats as well as best practices for insider threat monitoring.


Schools are facing these ransomware attacks with poorer cyber defenses than many private companies and far more vulnerabilities that hackers could exploit.


Bill includes the use of the CIS Critical Security Controls as part of a reasonable cybersecurity program HARTFORD, Conn, July 12, 2021 –



The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.


Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center for Internet Security.


Learn more about the new hardened VMs from CIS. They're Windows Server 2019 STIG and Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors.


Many people are working from home instead of commuting. But shared computers and home networks can make you vulnerable to ransomware. Here's what to do.


1 2 3 4 156