CIS Logo
tagline: Confidence in the Connected World


The Winter 2017 issue of Cybersecurity Quarterly highlights exploits giving hackers, the keys to unpatched wi-fi and more.


Avoiding Holiday Scams
December 12, 2017

December 2017 Volume 12 Issue 12 From the desk of Thomas F Duffy, MS-ISAC Chair The holiday season is a great time to make charitable gifts to



By Tony Sager, Senior Vice President, and Chief Evangelist  Although it may seem fast-paced and glamorous, the cyber threat landscape is actually



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



A vulnerability has been identified in Apache products that could allow for remote code execution.



December 7, 2017 PRNewswire Last week, the University of Chicago’s Harris School of Public Policy linked up with the world’s largest hacking



Multiple vulnerabilities have been discovered in iOS, tvOS, watchOS, High Sierra, Sierra, and El Capitan.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Security in the cloud is just as vital as security in on-premises environments. Hardening a system is a way to protect it by reducing vulnerability.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been identified in Apache Software Foundation Struts version 2, the most severe of which could allow for remote code execution.



What Is Log Management?
December 4, 2017

November 26, 2017 Security Boulevard Article discusses how the one of the CIS Controls addresses log



11/15/2017 ITPS Magazine Article says CIS advises, “because privilege accounts are a primary method for attackers to spread inside a target



Multiple vulnerabilities have been discovered in Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



1 42 43 44 45 46 99