Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

CISA Creates List of Free Cybersecurity Tools and Services for Defenders

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday announced that it has compiled a list of free cybersecurity tools and services that can help organizations reduce risk and improve resilience.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday announced that it has compiled a list of free cybersecurity tools and services that can help organizations reduce risk and improve resilience.

The list includes open source tools and free resources provided by various private companies and government organizations. CISA plans on continuously updating the list and it will also create a process for third-parties to submit other resources for inclusion.

The tools and services focus on helping organizations reduce the likelihood of a damaging cyber incident, quickly detect malicious activity, respond to incidents, and maximize resilience.

The list currently includes roughly 100 tools and services, including ones offered by CISA, Microsoft, Google, Cloudflare, Cisco, Center for Internet Security, CrowdStrike, Tenable, AT&T Cybersecurity, IBM, Mandiant, Splunk, VMware, SANS, Secureworks, and Palo Alto Networks. Twenty-five are open source tools not linked to vendors.

CISA noted that it does not endorse any commercial product or service, and it does “not attest to the suitability or effectiveness of these services and tools for any particular use case.”

The agency has advised organizations — before turning to the free tools and services — to fix known high-risk vulnerabilities, implement multifactor authentication, replace unsupported products, and reduce their internet attack surface. Organizations can also sign up for CISA’s Cyber Hygiene Vulnerability Scanning, which involves vulnerability scans and the delivery of weekly reports.

CISA also maintains a list of more than 370 vulnerabilities that are known to have been exploited in attacks. Federal agencies are required to fix these flaws within defined timeframes, but other organizations are also advised to use the list to prioritize patching.

Related: CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes

Advertisement. Scroll to continue reading.

Related: CISA Says ‘HiveNightmare’ Windows Vulnerability Exploited in Attacks

Related: CISA Again Warns U.S. Organizations of Potential Russian Cyberattacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...