CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



A vulnerability has been discovered in the Microsoft Cryptographic library CRYPT32.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Learn about some warning signs to look for and basic precautions you can take to minimize risk and avoid becoming the next tax scam victim!


Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape.


Hear from a few cyber thought leaders at CIS and learn what cybersecurity trends they're expecting to see in the new year.


Learn how one cybersecurity consulting organization uses the CIS SecureSuite Membership resources to help clients defend against cyber threats.


A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



A vulnerability has been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), which could allow for arbitrary code execution.



A vulnerability has been discovered in the Citrix Application Delivery Controller Web Server which could allow for remote code execution.



CIS CISO, Sean Atkinson highlights 10 cybersecurity practices CISOs can fall prey to and what to do to avoid them in the futuire.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Fedora Family Linux
January 4, 2020

Securing Fedora Family Linux An objective, consensus-driven security guideline for the Fedora Family Linux Operating Systems



PowerShell is a task-based command-line shell or user interface serving as Microsoft’s configuration management framework


Learn how one financial institution uses the cybersecurity best practices included in CIS SecureSuite Membership to bolster their cyber defenses.


1 2 3 4 5 6 114