Risk
7/2/2013
06:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Center for Internet Security Expands Membership Options, Provides Additional Flexibility To Security Consultants And Auditors

New membership category enables cost-effective use of configuration security assessment tool for short-term consulting and auditing engagements

East Greenbush, NY - (July 02, 2013)

The Center for Internet Security (CIS), a nonprofit organization focused on enhancing the cyber security readiness and response of public and private sector entities, today announced a new type of membership that further expands the availability of its CIS-CAT assessment tool, a powerful automated resource for measuring the configuration security status of information systems against CIS Benchmarks. Now available for use in a 30-day membership, the CIS-CAT Consulting Engagement Membership allows individual IT security consultants and auditors to cost-effectively leverage CIS-CAT to help meet their clients' security goals.

CIS created the CIS-CAT Consulting Engagement Membership in response to the growing demand from security consultants and auditors needing access to CIS-CAT for short-term client engagements. Security consultants and auditors can use CIS-CAT to assess hundreds of client system configuration settings within minutes, and can easily measure, monitor and report client security configuration conformance with industry best practices while also demonstrating improvement over time.

"This new offering is the latest initiative implemented by CIS to help make cyber security more affordable and accessible," said Rick Comeau, Executive Director, CIS Security Benchmarks division. "With the CIS-CAT Consulting Engagement Membership, IT security consultants and auditors now have another flexible option to include in their toolbox for identifying and remediating security vulnerabilities."

System configuration issues are among the most common vulnerabilities hackers exploit to attack organizations. The 20 Critical Security Controls for Effective Cyber Defense and the Australian Government's 35 Strategies to Mitigate Targeted Cyber Intrusions, two leading security guidelines, recommend system and application hardening as a key strategy for minimizing cyber risk. CIS-CAT helps organizations improve configuration security by identifying configuration-based vulnerabilities and providing step-by-step strategies for remediating them.

For more information or to enroll as a CIS-CAT Consulting Engagement member, visit CIS at: http://benchmarks.cisecurity.org/membership/cis-cat-consulting

About the Center for Internet Security

The Center for Internet Security (CIS) is a not-for-profit organization whose mission is to enhance the cyber security readiness and response of public and private sector entities, with a commitment to excellence through collaboration. CIS comprises three divisions: the Multi-State Information Sharing and Analysis Center, which serves as a key cyber security resource for the nation's state, local, territorial, and tribal (SLTT) governments; the Security Benchmarks Division, which provides consensus best practice standards for security configurations; and the Trusted Purchasing Alliance, which serves SLTT governments and not-for-profits in achieving a greater cyber security posture through trusted expert guidance and cost-effective procurement.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice one
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0845
Published: 2015-04-17
Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates.

CVE-2015-0967
Published: 2015-04-17
Multiple cross-site scripting (XSS) vulnerabilities in SearchBlox before 8.2 allow remote attackers to inject arbitrary web script or HTML via (1) the search field in plugin/index.html or (2) the title field in the Create Featured Result form in admin/main.jsp.

CVE-2015-0968
Published: 2015-04-17
Unrestricted file upload vulnerability in admin/uploadImage.html in SearchBlox before 8.2 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and the image/jpeg content type, a different vulnerability than CVE-2013-3590.

CVE-2015-0969
Published: 2015-04-17
SearchBlox before 8.2 allows remote attackers to obtain sensitive information via a pretty=true action to the _cluster/health URI.

CVE-2015-0970
Published: 2015-04-17
Cross-site request forgery (CSRF) vulnerability in SearchBlox before 8.2 allows remote attackers to hijack the authentication of arbitrary users.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.