Home Page | CISA
- ️Tue Mar 18 2025
Active Assailant Emergency Action Plan Template and Instructional Guide
Provide organizations and venue operators with tangible guidance to assist users with developing a comprehensive and implementable emergency action plan (EAP).
Mitigation Strategies for Edge Devices: Executive Guidance
Foreign adversaries routinely exploit software vulnerabilities in network edge devices. With U.S. and international partners, we released strategies and guides to help organizations protect their network edge devices and appliances.
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
Read recommended actions and mitigations to detect and protect against exploitation of Ivanti vulnerabilities, CVE-2024-8963, CVE-2024-9379, CVE-2024-8190 and CVE-2024-9380.
Unlocking Vulnrichment: Enriching CVE Data
In today’s fast-paced cybersecurity landscape, staying ahead of vulnerabilities is a daily race against time. Every day, dozens to hundreds of new Common Vulnerabilities and Exposures are published, many of which affect critical systems.
Product Security Bad Practices Version 2
For software manufacturers who produce software used in service of critical infrastructure or national critical functions (NCFs). This revised joint guide includes feedback from public comment period in 2024.
Closing the Software Understanding Gap
Read how we can help close the gap and secure our infrastructure with a deep, scalable understanding of software-controlled systems, including AI-systems.