CIS Logo
tagline: Confidence in the Connected World

The attacks highlight how vulnerable local jurisdictions remain despite four years of efforts to shore up defenses in preparation for the 2020 presidential election.

Rather than creating a new password every 30, 60 or 90 days, NIST now recommends you avoid frequent changes unless it has been compromised.

By enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs.

Mobile, the Internet of Things (IoT) and the cloud have dissolved the traditional boundaries of the network. Organizations need to now approach network security from a more holistic and strategic viewpoint.

NLC predicts that 2020 will be the year that cybersecurity efforts will be widespread and effective, particularly in government.

The winners will be honored at an awards dinner at the Albany Hilton on Tuesday, May 5. During the event, the companies will learn where they rank among their size category.

The federally funded information sharing and analysis center provides free help to large and small government agencies.

While IT asset management is not a new field for IT professionals, the push to have an automated inventory for OT and control systems is a new phenomenon.

Learn key practices to protect cloud workloads when using VMs, endpoints, or containers. And, consider the best means for building a fruitful feedback loop.

The announcement reinforces the company’s commitment to its ecosystem approach, and in helping customers extract maximum value from the TrueFort platform.

And, CIS, an AWS technology partner, announced new benchmarks and hardened images on AWS Marketplace to help cloud customers remain secure.

Through their implementation of security processes or technology, each person has demonstrated meaningful and measurable advances in security.

Dealers who aren’t sure where to start, or who want to proactively evolve their IT before they’re forced to, should start with the first five CIS controls.

Organizations that leverage Jamf Protect can now ensure that the configurations of their critical assets align with the CIS Benchmarks.

The widespread implementation of this network security tool is helping protect future elections.

1 2 3 4 5 18