CIS Logo
tagline: Confidence in the Connected World


CIS provides a valuable framework for how state and local governments should be thinking about the basic elements of security for remote work.


Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in iCloud for Windows, Safari, macOS, and Windows Migration Assistance.



This virtual training series, exclusively for our small business and SLTT members, provides step-by-step guidance to get the most out of CIS SecureSuite.


A vulnerability has been discovered in Cisco Unified Contact Center Express which could allow for remote code execution.



Verizon's Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches The information and analysis



This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.


CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.


Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.


Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition.



In April 2020, the MS-ISAC found the Top 10 Malware variants comprised 53% of Total Malware activity, which is up from 42% in March.


Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for session fixation attacks.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



1 2 3 77