CIS Logo
tagline: Confidence in the Connected World


The Top 10 Malware variants for September closely resemble those of the previous month with the exception of Bifrose and CryptoWall.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Firefox security flaws could allow an attacker to run arbitrary code on vulnerable systems.


11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Learn how you’re affected by data breaches and discover the best practices that can help defend your organization against them.


Learn more about how adding CIS Hardened Images to NGINX environments allows you to enjoy security without sacrificing computational efficiency. 


In light of concrete evidence that there was indeed foreign interference in the 2016 Presidential Election, it falls to the states and localities to keep American democratic processes secure.


This year’s overarching message – "Own IT. Secure IT. Protect IT. "– has been designed to encourage proactive behavior, and promote security best practices.


These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote unauthorized access with elevated privileges on the affected system.



A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



1 2 3 4 5 109