CIS Logo
tagline: Confidence in the Connected World


Learn how the State of Minnesota leverages CIS SecureSuite Membership to implement cybersecurity best practices like the CIS Benchmarks.


As security teams strive to adjust to a new norm for an indefinite period, there are ways to lower the risk associated with WFH environments..


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Google has said that the Chrome update will roll out over the coming days and weeks, but you really shouldn't wait for your browser to update automatically.


Multiple vulnerabilities have been discovered in DrayTek devices which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 election.


In 2019, Ryuk was one of the most impactful and most reported ransomware variants in the U.S. State, Local, Tribal, and Territorial government sector.


This virtual training series, exclusively for our small business and SLTT members, provides step-by-step guidance to get the most out of CIS SecureSuite.


Multiple vulnerabilities have been discovered in iCloud for Windows, iTunes for Windows, iOS, iPadOS, Safari, watchOS, tvOS, macOS, and Xcode.



Overall, the Top 10 Malware variants comprised 51% of Total Malware activity in February, down slightly from 53% in January.


Multiple vulnerabilities have been discovered in Microsoft Windows Adobe Type Manager Library, the most severe of which could allow an attacker to execute remote code on the affected system.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Chief Information Officers have a unique set of responsibilities in a pandemic that far exceed the normal requirements of maintaining IT operations.


1 2 3 74