CIS Logo
tagline: Confidence in the Connected World


Mobile, the Internet of Things (IoT) and the cloud have dissolved the traditional boundaries of the network. Organizations need to now approach network security from a more holistic and strategic viewpoint.


Ransomware attacks continue to be a major cyber threat for organizations of every size. Follow seven steps to help prevent and limit the impacts.


Multiple vulnerabilities have been discovered in Xcode, watchOS, Safari, iTunes for Windows, iOS, iPadOS, macOS, and tvOS.



What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content



Marion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



NLC predicts that 2020 will be the year that cybersecurity efforts will be widespread and effective, particularly in government.


CIS SecureSuite Members have new features available in CIS-CAT Pro, like conducting remote assessments and customizing HTML reports.


A vulnerability has been discovered in Microsoft Internet Explorer, which could allow for arbitrary code execution.



The winners will be honored at an awards dinner at the Albany Hilton on Tuesday, May 5. During the event, the companies will learn where they rank among their size category.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Top 10 Malware variants comprised 48% of total malware activity in December 2019 with fewer infections across almost every Top 10 malware variant.


A vulnerability has been discovered in the Revmakx InfiniteWP Client Plugin that could allow for authentication bypass.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



A vulnerability has been discovered in the Microsoft Cryptographic library CRYPT32.



1 2 3 4 5 114