CIS Logo
tagline: Confidence in the Connected World


An email bomb is an attack against an email server designed to inhibit the server’s normal function or render it unresponsive or causing network downtime.


This blog post is a short interview with a CIS Controls™ volunteer. Rick Doten makes sure that the CIS Benchmarks and Controls reflect global knowledge.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



Multiple vulnerabilities have been discovered in Adobe Flash Player that could allow for remote code execution.



March 12, 2018 East Greenbush, NY CIS Senior Vice President & Chief Evangelist of the CIS Controls will make a presentation on “Making



A vulnerability has been discovered in ManageEngine Applications Manager, which could allow for remote code execution.



Learn how Crysis Averted uses the CIS Controls to help provide risk management services.


March 7, 2018 East Greenbush, NY CIS, an Amazon Web Services, Inc (AWS) Technology Partner Within the AWS Partner Network (APN), Delivers AMIs



CIS Hardened Images, preconfigured virtual machines, are now available for Government Agencies to deploy in the AWS GovCloud (US) region.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



In this blog post, our CISO discusses a necessity of a collaborative process to successfully identify risks throughout an organization.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Learn how the Federal Reserve internal auditors use a highly coordinated approach to audit coverage that leverages the CIS Controls framework.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



2/28/18 “Capital Tonight” on Spectrum Cable News CIS President & COO Steve Spano appears in extensive interview on new cybersecurity



1 42 43 44 45 46 106