CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



1/5/2018 FCW Magazine Article quotes Curtis Dukes on Meltdown and Spectre vulnerabilities that exist in the processor chips of virtually all



1/5/2018 GCN CIS has issued a set of controls designed to provide agencies with a checklist for better security implementations While there are 20



On January 3, 2018, Governor Andrew Cuomo proposed in his State of the State address that New York State enhance statewide election cybersecurity



Telenet, the largest telecommunications company in Belgium, adopted the CIS Controls to build a road map to align with its ISO-27000 compliance program.


1/4/2018 Toledo Legal News SB 220, a proposed bill that would protect businesses that, despite their good faith efforts to guard the personal



January 2018 Volume 13 Issue 1 From the desk of Thomas F Duffy, MS-ISAC Chair January 28th is National Data Privacy Day, an educational



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



1/3/18 BW CIOWORLD Kroll, a leader in risk mitigation, investigations, compliance, cyber resilience, security, and incident response solutions,



1/2/18 The State of Security CIS maintains the CIS Controls They are a great way to organize a security team's time and budget in the most



By Tony Sager, Senior Vice President, and Chief Evangelist Have you ever heard of Security Content Automation Protocols (SCAP) SCAP is a method for



By: Curtis Dukes, Executive Vice President Ransomware involves a request for a sum of money calculated to be less expense and trouble than trying



In November 2017 notifications regarding the Top 10 Malware decreased by 41%, coinciding with an overall 45% decrease in all new malware infections,



1 43 44 45 46 47 101