CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



A vulnerability has been discovered in macOS, iOS, WatchOS, iPadOS, and tvOS which could allow for arbitrary code execution.



CIS provides a valuable framework for how state and local governments should be thinking about the basic elements of security for remote work.


Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in iCloud for Windows, Safari, macOS, and Windows Migration Assistance.



This virtual training series, exclusively for our small business and SLTT members, provides step-by-step guidance to get the most out of CIS SecureSuite.


A vulnerability has been discovered in Cisco Unified Contact Center Express which could allow for remote code execution.



The 2020 Verizon DBIR found that ransomware is on the rise and disproportionately affects the public sector (60% of malware vs. 27% in all sectors).


This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.


CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.


Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.


Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 4 5 6 80