www.cisecurity.org
Open in
urlscan Pro
68.232.34.125
Public Scan
Submitted URL: https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkI...
Effective URL: https://www.cisecurity.org/ms-isac/
Submission: On September 30 via api from US — Scanned from DE
Effective URL: https://www.cisecurity.org/ms-isac/
Submission: On September 30 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.cisecurity.org/
<form autocomplete="off" class="main_search_form" role="search" method="get" id="form_desktop_search" action="https://www.cisecurity.org/">
<input class="homepage_search_input" style="border:0;background-color:rgba(255,255,255,0); display:inline-block;padding:.5em;padding-left:1.5em;width:545px;" title="search" type="text" placeholder="" name="s" id="input_desktop_search" value="">
<span id="desktop_search" class="btn btn-primary pull-right main_search_button pointer_cursor" style="padding:.5em;border-radius:5px;padding-left:.75em;padding-right:.95em;">
<img class="pointer_cursor " alt="search" src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-search-blue.svg" style="display:inline;width:1.4em;">
</span>
</form>
GET https://www.cisecurity.org/
<form autocomplete="off" class="main_search_form" role="search" method="get" id="form_mobile_search" action="https://www.cisecurity.org/">
<table style="background-color:#eee; width:100%">
<tbody>
<tr>
<td style="vertical-align: middle;padding:.75em;">
<img class="pointer_cursor main_search_button " alt="Search" id="mobile_search" src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-search-mobile-blue.svg" style="padding-right:1em;">
<input class="homepage_search_input" style="border:0;background-color:rgba(255,255,255,0); width:70%;display:inline;" title="search" type="search" placeholder="" name="s" id="input_mobile_search" value="">
<a class="pointer_cursor search_toggle nav_close_button pull-right" style="font-size:1.5em;font-weight:bold;padding-top:.075em;padding-right:.5em;">×</a>
<!-- <img class="search_toggle pointer_cursor pull-right" src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-mobile-close_search.svg" style="font-size:1.5em;padding-right:1em;display:inline;">-->
</td>
</tr>
</tbody>
</table>
</form>
Text Content
This website uses cookies You’re here because you take cybersecurity seriously, and so does CIS. The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy. AcceptDecline x Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more Back × Why CIS Solutions Join CIS Resources -------------------------------------------------------------------------------- CIS WorkBench Sign-in CIS Hardened Images Support Alert Level: Guarded WHY CIS WHO WE ARE CIS is an independent, nonprofit organization with a mission to create confidence in the connected world -------------------------------------------------------------------------------- About Us Leadership Principles Testimonials SOLUTIONS SECURE YOUR ORGANIZATION -------------------------------------------------------------------------------- CIS Controls® Prioritized & simplified best practices CIS Controls Community Help develop and maintain the Controls CIS RAM Information security risk assessment method CIS CSAT Assess & measure Controls implementation SECURE SPECIFIC PLATFORMS -------------------------------------------------------------------------------- CIS Benchmarks™ 100+ vendor-neutral configuration guides CIS Benchmarks Community Develop & update secure configuration guides CIS-CAT® Assess system conformance to CIS Benchmarks CIS Hardened Images® Virtual images hardened to CIS Benchmarks CIS SecureSuite® Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls Learn More Apply Now U.S. STATE, LOCAL, TRIBAL & TERRITORIAL GOVERNMENTS -------------------------------------------------------------------------------- MEMBERSHIPS MS-ISAC® Cybersecurity resource for SLTT Governments EI-ISAC® Election-focused cyber defense suite SERVICES FOR MEMBERS Albert Network Monitoring® Cost-effective Intrusion Detection System Managed Security Services Security monitoring of enterprises devices CIS CyberMarket® Savings on training and software Malicious Domain Blocking & Reporting Prevent Connection to harmful web domains View All CIS Services View All Products & Services JOIN CIS GET INVOLVED Join CIS as a member, partner, or volunteer - or explore our career opportunities -------------------------------------------------------------------------------- CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers RESOURCES RESOURCES -------------------------------------------------------------------------------- Blog Advisories Newsletters Press Releases In The News Elections Resources LEARN -------------------------------------------------------------------------------- White Papers Webinars Case Studies Spotlights FILTER BY TOPIC -------------------------------------------------------------------------------- CIS Benchmarks™ CIS Controls® CIS Hardened Images® CIS Services® MS-ISAC® EI-ISAC® View All Resources CIS Hardened Images Support CIS WorkBench Sign-in Alert Level: Guarded -------------------------------------------------------------------------------- Why CIS WHO WE ARE CIS is an independent, nonprofit organization with a mission to create confidence in the connected world. About Us Leadership Principles Testimonials Solutions SECURE YOUR ORGANIZATION -------------------------------------------------------------------------------- CIS Controls® Prioritized & simplified best practices CIS RAM Information security risk assessment method CIS Controls Community Help develop and maintain the Controls CIS CSAT Assess & measure Controls implementation SECURE SPECIFIC PLATFORMS -------------------------------------------------------------------------------- CIS Benchmarks™ 100+ vendor-neutral configuration guides CIS-CAT® Assess system conformance to CIS Benchmarks CIS Benchmarks Community Develop & update secure configuration guides CIS Hardened Images® Virtual images hardened to CIS Benchmarks CIS SecureSuite® Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls Learn More Apply Now U.S. STATE, LOCAL, TRIBAL & TERRITORIAL GOVERNMENTS -------------------------------------------------------------------------------- MEMBERSHIPS MS-ISAC® Cybersecurity resource for SLTT Governments EI-ISAC® Election-focused cyber defense suite SERVICES FOR MEMBERS Albert Network Monitoring® Cost-effective Intrusion Detection System Managed Security Services Security monitoring of enterprises devices CIS CyberMarket® Savings on training and software Malicious Domain Blocking & Reporting Prevent Connection to harmful web domains View All CIS Services View All Products & Services Join CIS GET INVOLVED Join CIS as a member, partner, or volunteer - or explore our career opportunities. CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers Resources RESOURCES -------------------------------------------------------------------------------- Blog Advisories Newsletters Press Releases In The News Elections Resources LEARN -------------------------------------------------------------------------------- White Papers Webinars Case Studies Spotlights FILTER BY TOPIC -------------------------------------------------------------------------------- CIS Benchmarks™ CIS Controls® CIS Hardened Images® CIS Services® MS-ISAC® EI-ISAC® View All Resources × -------------------------------------------------------------------------------- Home • MS-ISAC Join MS-ISAC® See list of members The mission of the MS-ISAC is to improve the overall cybersecurity posture of the nation's state, local, tribal and territorial governments through focused cyber threat prevention, protection, response, and recovery. Report an Incident SolarWinds Cyber-Attack Updates Microsoft Exchange Zero-Day Updates Learn More about the Alert Level See Our FAQ Read the MS-ISAC Mission & Charter SERVICES INCLUDED WITH MEMBERSHIP * 24/7 Security Operation Center * Incident Response Services * Cybersecurity Advisories and Notifications * Access to Secure Portals for Communication and Document Sharing * Cyber Alert Map * Malicious Code Analysis Platform (MCAP) * Weekly Top Malicious Domains/IP Report * Monthly Members-only Webcasts * Access to Cybersecurity Table-top Exercises * Vulnerability Management Program (VMP) * Nationwide Cyber Security Review (NCSR) * Awareness and Education Materials MS-ISAC Cyber Alert Level: GUARDED See All Services Learn More about the Alert Level All U.S. SLTTs are now eligible for a FREE CIS SecureSuite Membership! Learn more & Apply today! Election Infrastructure Security Learn more & Apply today! View past MS-ISAC Webinars! MS-ISAC NEWSLETTERS, WEBCAST ANNOUNCEMENTS, AND ADVISORIES Subscribe LATEST MS-ISAC RESOURCES See all CONTROL: 1 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Media mention • 30 Sep 2021 Center for Internet Security issues version 2.0 of ‘community defense model,’ prioritizing controls against prevalent attacks CONTROL: 2 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- White paper • 29 Sep 2021 CIS Community Defense Model 2.0 CONTROL: 3 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Blog post • 29 Sep 2021 CIS Introduces v2.0 of the CIS Community Defense Model CONTROL: 4 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Press-release • 29 Sep 2021 Center for Internet Security (CIS) Releases Community Defense Model v2.0 for Cybersecurity See Our Cybersecurity Threats Page Network Monitoring & Analysis Security Assessment & Consulting TRAINING OPPORTUNITIES -------------------------------------------------------------------------------- FED-VTE Over 900 hours of free cybersecurity training for any government employee or veteran. Enroll Now SANS COURSES Receive discounts on SANS and more through CIS CyberMarket.Learn more WEBINAR • Stay up-to-date with emerging cybersecurity threats and topics.Learn more OUR PARTNERS * * * * * * * * * * * * * * * * * * * INFORMATION HUB : ADVISORIES -------------------------------------------------------------------------------- CONTROL: 1 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Advisory • 28 Sep 2021 Multiple Vulnerabilities in Microsoft Edge Could Allow for Arbitrary Code Execution CONTROL: 2 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Advisory • 27 Sep 2021 A Vulnerability in SonicWall SMA 100 Series Could Allow for Arbitrary File Deletion CONTROL: 3 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Advisory • 24 Sep 2021 A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution CONTROL: 4 --- ADVISORY CONTROL: 0 -------------------------------------------------------------------------------- Advisory • 23 Sep 2021 Multiple Vulnerabilities in Nagios Could Allow for Remote Code Execution * About us * Leadership * Board * Jobs * Media * Testimonials * Events * Contact * Member Support * Programs & Memberships * CIS Communities * CIS Benchmarks™ * CIS Controls® * CIS SecureSuite® * MS-ISAC® * EI-ISAC® * Tools * CIS-CAT®Lite * CIS-CAT®Pro * CIS WorkBench * CIS RAM * CIS CSAT * Services * CIS Hardened Images® * Network Monitoring – Albert * CIS CyberMarket® * Resources * Blog * Case Studies * Newsletters * Videos * Webinars * Whitepapers * US Cyber Challenge * CyberCompEx * Elections Resources Copyright © 2021 Center for Internet Security® Privacy Policy