CIS Logo
tagline: Confidence in the Connected World


Learn how New Hampshire Hillsboro-Deering School District enhances cyber hygiene by implementing the CIS Controls Implementation Group 1.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Learn how to better prepare for your next cybersecurity compliance audit with the consensus-developed resources from CIS.


The award was unveiled at the inaugural Microsoft Security 20/20 partner awards, on February 23, 2020 during the RSA conference in San Francisco.


A vulnerability in ManageEngine Desktop Central could allow for remote code execution.



The contest is designed to encourage young people to think about online safety, cybersecurity best practices, and cyberbullying.


Catch up on CIS’s activities from RSA 2020, including recognition for cybersecurity contributions and presenting on election security.


Multiple vulnerabilities have been discovered in Cisco Webex Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



CIS has created over 30 different Hardened Images, duplicated across four cloud platforms; they're used in more than 100 different countries.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Learn how macro instructions used for automation can be leveraged by cybercriminals – and what to do about it.


National security professionals are monitoring efforts to counter cyberattacks and foreign disinformation aimed at Super Tuesday presidential primaries.


A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads.



Multiple vulnerabilities have been discovered in Red Hat products, the most severe of which could allow for reading of arbitrary files on the affected system.



1 2 3 4 5 117