CIS Logo
tagline: Confidence in the Connected World


Web browsers have greatly improved their patching practices around common or popular software applications shrinking the attack surface.


This document sets forth an actionable approach to ensure each state has cyber governance, and can maximize investments while securing their state.


Multiple vulnerabilities have been discovered in SonicWALL Sonic OS, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Magento CMS, the most severe of which could allow for arbitrary code execution.



The term “best practice” often comes up in tandem with “cyber hygiene.” CIS defines basic cyber hygiene as CIS Controls IG1.


The toolkit follows best practice recommendations provided by CIS, the UK National Cybersecurity Centre, and the Australia Cybersecurity Centre.


A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Check out the latest CIS Benchmarks for October 2020, including ROS Melodic, Oracle Database 19c, Microsoft Windows Server 2016 STIG, and more.


CIS-CAT Pro offers an easy way to remotely scan target machines to CIS Benchmarks. Save up to 20% on a new CIS SecureSuite Membership before Oct 31.


The initial key to the effort was regular sharing of intelligence and other security information, plus a reporting structure centered around the MS-ISAC.


11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.


A vulnerability has been discovered in Adobe Flash Player, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



This partnership is an important step in making foundational cybersecurity more attainable, and addresses the two primary challenges organizations face in achieving basic cyber hygiene.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 4 137