CIS Logo
tagline: Confidence in the Connected World


Cloud infrastructure is making a difference in the workplace as it helps businesses leverage modern security solutions and flexible computing power.


Security updates for the Thunderbird email client address vulnerabilities that could be exploited to execute arbitrary code on impacted systems.


Enterprises building cloud-native applications are embracing technologies and platforms that support accelerated and agile development.


By reminding your employees of these simple online safety best practices, your organization can avoid becoming the next victim of a cyber-attack.


Inconsistent internet security on municipal websites can attract hackers and challenge officials to balance convenience with security.


ElectionGuard, was designed to enable end-to-end verification of elections, and allow voters and third-party organizations to verify election results.


Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.


Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.


Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.


The MS-ISAC brings expertise to local governments facing cybersecurity challenges and security flaws such as exposed server passwords.


California uses a checklist of security controls created by CIS to ensure that they are following the state's data security compliance laws.


Any strong cybersecurity program should also include a strong and continuous vulnerability management plan. Vulnerability Management goes beyond compliance.


Connectivity and connected features are changing commercial truck fleet operations.The extensiveness of such connected features increases vulnerabilities.


4/19/2019 News Wire "Global Cyber Alliance obtains more than $15M in additional funds from other sources to support its efforts to eradicate cyber



3/6/19 Forbes “Extending to the public cloud, the CSF may be used in conjunction with the new CIS Controls Cloud Companion Guide that



1 2 3 4 14