CIS Logo
tagline: Confidence in the Connected World


The money for cybersecurity grants is part of legislation that would also require states to collect paper ballots and set minimum cybersecurity standards.


Multiple vulnerabilities have been discovered in Cisco Small Business 220 Series Smart Switches, the most severe of which could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges on a targeted system.



Multiple vulnerabilities have been discovered in Cisco WebEx Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Some argue paying the hackers in bitcoins is a good option because it’s cheaper to pay the attacker, rather than spend a small fortune to rebuild an entire computer system.


Implementation of either STIG or CIS Benchmarks can be a challenge if the process isn’t somewhat automated, due to the disparate requirements.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



From conducting assessments or evaluating risk, an Information Security Senior Auditor uses analytical skills and a collaborative nature to get the job done.


Beyond configuration settings, a hardened build standard naturally needs to be extended to a software image in terms of installed packages and approved versions, a further key source of vulnerabilities.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Learn how ransomware threatens SLTT government systems and data, along with some best practices to help prevent an attack.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Wind River’s VxWorks Real Time Operating System (RTOS), the most severe of which could allow for remote code execution.



Manage your data, and safely dispose of data you don't need.


1 2 3 4 101