CIS Logo
tagline: Confidence in the Connected World


These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote unauthorized access with elevated privileges on the affected system.



A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



With CIS Hardened Images you can have peace of mind knowing your employees are working in an environment that is built to defend against cyber threats.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Defense in Depth (DiD) involves a series of security mechanisms and controls that are thoughtfully layered throughout a computer network.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Cybersecurity relies on specialists of every kind to achieve success. It takes a team in order to avoid the pitfalls of cyber vulnerabilities and attacks.


Pay Us or Else
October 9, 2019
Local governments are being targeted by ransomware at an alarming rate, and very few communities are prepared to deal with the threat.


Multiple vulnerabilities have been discovered in iCloud, iTunes, and macOS Catalina.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Smart cities leverage technology in new and advanced ways – but at what security cost? Read on for essential cyber defense for smart cities.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution with root privileges on the affected system.



1 2 3 4 5 108