CIS Logo
tagline: Confidence in the Connected World


Learn how one cybersecurity consulting organization uses the CIS SecureSuite Membership resources to help clients defend against cyber threats.


A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



A vulnerability has been discovered in the Citrix Application Delivery Controller Web Server which could allow for remote code execution.



A vulnerability has been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), which could allow for arbitrary code execution.



CIS CISO, Seat Atkinson highlights 10 cybersecurity practices CISOs can fall prey to and what to do to avoid them in the futuire.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Fedora Family Linux
January 4, 2020

Securing Fedora Family Linux An objective, consensus-driven security guideline for the Fedora Family Linux Operating Systems



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


PowerShell is a task-based command-line shell or user interface serving as Microsoft’s configuration management framework


Learn how one financial institution uses the cybersecurity best practices included in CIS SecureSuite Membership to bolster their cyber defenses.


The federally funded information sharing and analysis center provides free help to large and small government agencies.


This document provides a detailed mapping of the relationships between the CIS Controls and NIST Special Publication 800-53 R4, "Security and Privacy Controls for Federal Information Systems and Organizations."


This document provides a detailed mapping of the relationships between the CIS Controls and NIST Special Publication 171 R2, "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations."


The Winter 2019 issue of Cybersecurity Quarterly covers everything from how to stop holiday scams to lifting up the new generation of cyber professionals.


While IT asset management is not a new field for IT professionals, the push to have an automated inventory for OT and control systems is a new phenomenon.


1 2 3 4 112