CIS Logo
tagline: Confidence in the Connected World


Learn how the CIS Controls and related tools can help organization s around the world build an “on-ramp” to better cyber defenses.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Adobe Flash Player which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



NIST OLIR Submission V1
September 9, 2019
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format. 


Ohio’s top elections official will ask a state budgetary panel for about $1.7 million to monitor county boards of elections for potential cybersecurity threats.


This Security Event Primer provides information on general malware operations, IDS event types, requirements, recommendations, and references.


A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands when initiating TLS connections to affected mail servers.



Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google has not provided an estimated time frame for the patch.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Learn how DMARC email authentication, policy, and reporting protocol can help protect an organization from experiencing a phishing attack.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



The guide includes a network security checklist, and also shows users how to map security configurations to the CIS Controls.


1 2 3 4 5 6 106