CIS Logo
tagline: Confidence in the Connected World


CIS's Malicious Domain Blocking and Reporting (MDBR) service is the latest tool added to their defense in depth portfolio of cyber defenses.


Increasing numbers of polling places use electronic devices to check in voters and verify eligibility, introducing new election security vulnerabilities.


Staying safe secure while working remotely is important. Learn best practices that can be implemented quickly and effectively from wherever you are working.


The new agreement will strengthen the cyber and physical defenses of the energy sector, and meet a goal of the Cybersecurity Solarium Commission.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in IBM Security Guardium Insights, the most severe of which could allow for the program to become compromised.



As an election community, we are practiced and prepared to take these challenges head on and ensure American voters decide American elections.


Check out the latest CIS Benchmarks in August 2020, including Oracle Cloud Infrastructure, Microsoft Windows 10 Enterprise Release 2004, and more.


Four states and a county government are taking part in an effort to deploy security orchestration, automation and response tools.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Ongoing revisions help organizations map the Controls in meaningful ways, pointing to the recent changes made to map the Sub-Controls to MITRE ATT&CK.


The Top 10 Malware July 2020 composition was consistent through July 2020, with the exception of Shlayer, Bancos, and TrickBot.


A vulnerability has been discovered in Cisco Small Business, Smart, and Managed Switches, which could allow for a denial-of-service condition.



The community defense model highlights the safeguards that show up on any to-do list for cybersecurity and should be implemented by most organizations.


1 2 3 4 5 134