Risk
7/2/2013
06:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Center for Internet Security Expands Membership Options, Provides Additional Flexibility To Security Consultants And Auditors

New membership category enables cost-effective use of configuration security assessment tool for short-term consulting and auditing engagements

East Greenbush, NY - (July 02, 2013)

The Center for Internet Security (CIS), a nonprofit organization focused on enhancing the cyber security readiness and response of public and private sector entities, today announced a new type of membership that further expands the availability of its CIS-CAT assessment tool, a powerful automated resource for measuring the configuration security status of information systems against CIS Benchmarks. Now available for use in a 30-day membership, the CIS-CAT Consulting Engagement Membership allows individual IT security consultants and auditors to cost-effectively leverage CIS-CAT to help meet their clients' security goals.

CIS created the CIS-CAT Consulting Engagement Membership in response to the growing demand from security consultants and auditors needing access to CIS-CAT for short-term client engagements. Security consultants and auditors can use CIS-CAT to assess hundreds of client system configuration settings within minutes, and can easily measure, monitor and report client security configuration conformance with industry best practices while also demonstrating improvement over time.

"This new offering is the latest initiative implemented by CIS to help make cyber security more affordable and accessible," said Rick Comeau, Executive Director, CIS Security Benchmarks division. "With the CIS-CAT Consulting Engagement Membership, IT security consultants and auditors now have another flexible option to include in their toolbox for identifying and remediating security vulnerabilities."

System configuration issues are among the most common vulnerabilities hackers exploit to attack organizations. The 20 Critical Security Controls for Effective Cyber Defense and the Australian Government's 35 Strategies to Mitigate Targeted Cyber Intrusions, two leading security guidelines, recommend system and application hardening as a key strategy for minimizing cyber risk. CIS-CAT helps organizations improve configuration security by identifying configuration-based vulnerabilities and providing step-by-step strategies for remediating them.

For more information or to enroll as a CIS-CAT Consulting Engagement member, visit CIS at: http://benchmarks.cisecurity.org/membership/cis-cat-consulting

About the Center for Internet Security

The Center for Internet Security (CIS) is a not-for-profit organization whose mission is to enhance the cyber security readiness and response of public and private sector entities, with a commitment to excellence through collaboration. CIS comprises three divisions: the Multi-State Information Sharing and Analysis Center, which serves as a key cyber security resource for the nation's state, local, territorial, and tribal (SLTT) governments; the Security Benchmarks Division, which provides consensus best practice standards for security configurations; and the Trusted Purchasing Alliance, which serves SLTT governments and not-for-profits in achieving a greater cyber security posture through trusted expert guidance and cost-effective procurement.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-2721
Published: 2015-07-05
Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attacke...

CVE-2015-2722
Published: 2015-07-05
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.

CVE-2015-2724
Published: 2015-07-05
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code v...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report