CIS Logo
tagline: Confidence in the Connected World


The top 10 malware activity accounted for 57% of total malware notifications in March, which is a 1% increase from February.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Learn what it's like to help U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution on the affected system.



East Greenbush, NY April 17, 2019 CIS® (Center for Internet Security, Inc) announced today that it had been named a 2019 Top Workplace among



Multiple vulnerabilities has been discovered in the Drupal core module, the most severe of which could allow for arbitrary code execution.



Thanks to positive survey responses from CIS employees, we were named a 2019 Top Workplace by the Albany Times Union. Learn how we did it!


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Juniper Junos OS, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Shockwave Player, which could allow for arbitrary code execution.



In order to keep information safe or private, we need to take care of sharing it and teach cyber hygiene to those who may not understand its importance.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for arbitrary code execution.



Password attacks use of software that expedites cracking or guessing passwords to maliciously authenticate into password-protected accounts.


1 2 3 59