CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft Windows Adobe Type Manager Library, the most severe of which could allow an attacker to execute remote code on the affected system.



We need to focus more effort on, because it is where the highest risk of a breach will originate from, is within an organisation.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


CIS remains committed to keeping our Members secure on the home front amidst concerns that cybercriminals are exploiting disruptions caused by COVID-19.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Chief Information Officers have a unique set of responsibilities in a pandemic that far exceed the normal requirements of maintaining IT operations.


Multiple vulnerabilities have been discovered in Adobe Photoshop, ColdFusion, and Bridge that could allow for arbitrary code execution.



Get a closer look at how the CIS Controls and CIS Benchmarks consensus-based resources plug in to other security frameworks.


The  coronavirus epidemic is prompting companies to allow their employees to work from home or telecommute. Home IT devices are still subject to threats.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Employees agencywide are taking part in a telework event Friday that allows leaders to test how prepared their systems and networks are.


Multiple vulnerabilities have been discovered in SAP products, the most severe of which could allow an unauthenticated, remote attacker to execute code on the affected systems.



Discover five high impact actions telecommuters can take to enhance their network security to keep data safe and stay productive.


A vulnerability has been discovered in Microsoft Windows SMB Server that could allow for remote code execution.



Learn about the risk and rewards of social media for organizations and discover the importance of a social media security policy.


1 2 3 4 117