CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



The Department of State has established protocols that are to be followed in the event an attempted cyber incident or anomaly is detected.


Multiple vulnerabilities have been discovered in watchOS, Safari, iOS, iPadOS, macOS Catalina, and tvOS.



The Top 10 Malware variants for September closely resemble those of the previous month with the exception of Bifrose and CryptoWall.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Firefox security flaws could allow an attacker to run arbitrary code on vulnerable systems.


11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Learn how you’re affected by data breaches and discover the best practices that can help defend your organization against them.


Learn more about how adding CIS Hardened Images to NGINX environments allows you to enjoy security without sacrificing computational efficiency. 


In light of concrete evidence that there was indeed foreign interference in the 2016 Presidential Election, it falls to the states and localities to keep American democratic processes secure.


This year’s overarching message – "Own IT. Secure IT. Protect IT. "– has been designed to encourage proactive behavior, and promote security best practices.


1 2 3 4 108