CIS Logo
tagline: Confidence in the Connected World

A vulnerability in Palo Alto PAN-OS which could allow for authentication bypass.

Take the necessary steps to ensure employees can connect and collaborate securely while using a virtual conference platform.

This is enabled by Albert Network Monitoring, which examines internet traffic and connection attempts on networks owned and run by U.S. election officials.

A vulnerability has been discovered in Bitdefender SafePay, which could allow for remote code execution.

A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.

The June 2020 CIS Controls Self Assessment Tool (CSAT) Update v1.3.0 includes new features to make the tool easier to use, as well as some bug fixes.

SLTT employees working from home need more cybersecurity awareness training. The SANS Summer Buy Window offers awareness training to SLTTs at a discount.

Multiple vulnerabilities (known as Ripple20) have been discovered in Treck TCP/IP Stack, the most severe of which could result in remote code execution.

The report will essentially be a how-to guide for states that want to incorporate vetting such tools when they certify election equipment.

The RABET-V pilot program supports agile software development with a verification process that anticipates and supports rapid product changes.

Cloud storage also presents challenges to organizations that need to ensure the confidentiality, integrity, and availability of their data

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.

The National Kids Safe Online Poster Contest is open to K-12 students in all 50 states, the District of Columbia, U.S. territories, and U.S. military installations worldwide.

In April 2020 malspam accounted for the greatest number of alerts. Top 10 Malware composition was fairly consistent the exception of Modi, Mirai, and NSPPS.

Much of the data nonprofits hold is not obviously commercially sensitive, so it can be easy to overlook the value it can have data for hackers.

1 2 3 4 125