×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



This month's CIS Benchmark updates and releases for Apple macOS and Microsoft 365 created with the help of our community contributors.


The guide shares that working with a trusted partner is the most efficient way for agencies to efficiently execute any security strategy.


Cybersecurity governance must be agile, allowing cybersecurity programs to evolve as new threats that require adaptations in risk management strategies emerge.


Businesses that follow one of the approved frameworks will have an “affirmative defense” against claims that a breach was the result of a “failure to implement reasonable cybersecurity controls.”


A volunteer community of security experts creates CIS Benchmarks configuration guidelines across 25+ product vendor families.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



In this edition, read about the new CIS Controls v8, protecting remote work environments, and a sneak peek at the new Community Defense Model v2.0.


Recent Day One attacks have demonstrated how difficult it can be for organizations to react when vulnerabilities are announced.


This whitepaper download will address steps state governments should take to ensure cybersecurity is an integral part of the acquisition process.


Hospitals in Need of Cybersecurity STAT! This week's episode centers around hospital cybersecurity starting with Malicious Domain Blocking and Reporting.


The MS-ISAC is revamping the way it collects, analyzes, and disseminates Cyber Threat Intelligence (CTI) to members.


A vulnerability has been discovered in VMware Carbon Black App Control, which could result in an authentication bypass.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



The 2021 Kids Safe Online Activity Book showcases the winning artwork of students from around the country and offers educational games and resources.


1 2 3 4 5 156