Risk
7/2/2013
06:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Center for Internet Security Expands Membership Options, Provides Additional Flexibility To Security Consultants And Auditors

New membership category enables cost-effective use of configuration security assessment tool for short-term consulting and auditing engagements

East Greenbush, NY - (July 02, 2013)

The Center for Internet Security (CIS), a nonprofit organization focused on enhancing the cyber security readiness and response of public and private sector entities, today announced a new type of membership that further expands the availability of its CIS-CAT assessment tool, a powerful automated resource for measuring the configuration security status of information systems against CIS Benchmarks. Now available for use in a 30-day membership, the CIS-CAT Consulting Engagement Membership allows individual IT security consultants and auditors to cost-effectively leverage CIS-CAT to help meet their clients' security goals.

CIS created the CIS-CAT Consulting Engagement Membership in response to the growing demand from security consultants and auditors needing access to CIS-CAT for short-term client engagements. Security consultants and auditors can use CIS-CAT to assess hundreds of client system configuration settings within minutes, and can easily measure, monitor and report client security configuration conformance with industry best practices while also demonstrating improvement over time.

"This new offering is the latest initiative implemented by CIS to help make cyber security more affordable and accessible," said Rick Comeau, Executive Director, CIS Security Benchmarks division. "With the CIS-CAT Consulting Engagement Membership, IT security consultants and auditors now have another flexible option to include in their toolbox for identifying and remediating security vulnerabilities."

System configuration issues are among the most common vulnerabilities hackers exploit to attack organizations. The 20 Critical Security Controls for Effective Cyber Defense and the Australian Government's 35 Strategies to Mitigate Targeted Cyber Intrusions, two leading security guidelines, recommend system and application hardening as a key strategy for minimizing cyber risk. CIS-CAT helps organizations improve configuration security by identifying configuration-based vulnerabilities and providing step-by-step strategies for remediating them.

For more information or to enroll as a CIS-CAT Consulting Engagement member, visit CIS at: http://benchmarks.cisecurity.org/membership/cis-cat-consulting

About the Center for Internet Security

The Center for Internet Security (CIS) is a not-for-profit organization whose mission is to enhance the cyber security readiness and response of public and private sector entities, with a commitment to excellence through collaboration. CIS comprises three divisions: the Multi-State Information Sharing and Analysis Center, which serves as a key cyber security resource for the nation's state, local, territorial, and tribal (SLTT) governments; the Security Benchmarks Division, which provides consensus best practice standards for security configurations; and the Trusted Purchasing Alliance, which serves SLTT governments and not-for-profits in achieving a greater cyber security posture through trusted expert guidance and cost-effective procurement.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5426
Published: 2014-11-27
MatrikonOPC OPC Server for DNP3 1.2.3 and earlier allows remote attackers to cause a denial of service (unhandled exception and DNP3 process crash) via a crafted message.

CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?