copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
About CISA | CISA “The blue outer ring and the inner red ring indicate CISA’s unity with DHS and a nod to our efforts to cut through government red tape, while the three blue lines in the outer ring represent the Agency’s three congressionally mandated missions: cybersecurity, infrastructure security, and emergency communications The eagle faces to the right, signifying CISA’s keen eye on the future
Home Page | CISA CISA releases updated guidance with new IOCs and TTPs on Akira ransomware to help organizations detect and mitigate this evolving threat, which targets sectors like manufacturing, education, healthcare, and finance
Cybersecurity Alerts Advisories - CISA Advisory DefinitionsCybersecurity AdvisoriesIndustrial Control Systems AdvisoriesAlert: Provides succinct information on recent, ongoing, or high-impact cyber threats, plus associated mitigations, workarounds, and or detections Alerts typically include information on newly exploited or disclosed vulnerabilities, newly discovered cyber threat campaigns, severe denial-of-service events or
CISA Learning | CISA CISA Learning, the Cybersecurity and Infrastructure Security Agency (CISA) learning management system, provides cybersecurity and infrastructure security training free of charge to our partners from federal, state, local, tribal, and territorial levels of government, the private sector, our veterans and the general public Learn More at CISA Learning
Contact Us - CISA Report a Critical Infrastructure Incident If a significant security incident is detected while in progress, the facility should immediately call local law enforcement and emergency responders via 9-1-1 Similarly, if the event has concluded but an immediate response is still necessary, the facility should immediately call 9-1-1 Once the incident has concluded and the facility has addressed
Cybersecurity Training Exercises | CISA Cybersecurity Exercises CISA conducts cyber and physical security exercises with government and industry partners to enhance security and resilience of critical infrastructure These exercises provide stakeholders with effective and practical mechanisms to identify best practices, lessons learned, and areas for improvement in plans and procedures
Known Exploited Vulnerabilities Catalog - CISA For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework How to use the KEV
Widespread Supply Chain Compromise Impacting npm Ecosystem - CISA CISA is releasing this Alert to provide guidance in response to a widespread software supply chain compromise involving the world’s largest JavaScript registry, npmjs com A self-replicating worm—publicly known as “Shai-Hulud”—has compromised over 500 packages [i] After gaining initial access, the malicious cyber actor deployed malware that scanned the environment for sensitive
Divisions Offices - CISA Mission Enabling Offices As the CISA divisions focus on our operational mission, the Mission Enabling Offices focus on supporting the Divisions and the agency at large with personnel, budget, logistics and other vital operational support
Careers at CISA | CISA Meet the Mission CISA is more than a great place to work; our workforce tackles evolving risks and threats to the nation’s critical infrastructure and enables CISA’s mission through a range of positions Learn more about how you can become involved in the future Apply on USAJOBS Apply to the dhs Cybersecurity service Upcoming Hiring Events CISA participates in a variety of job fairs and