1-100 of about 144 matches for site:www.cisa.gov mitigate
https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-c...
ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA Skip to main
https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsof...
ED 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities | CISA Skip to main content An official website
CISA Issues Emergency Directive to Mitigate the Compromise of Solarwinds Orion Network Management Pr
https://www.cisa.gov/news-events/news/cisa-issues-emergency-directive-...
CISA Issues Emergency Directive to Mitigate the Compromise of Solarwinds Orion Network Management Products | CISA
CISA Releases New Insight to Help Critical Infrastructure Owners Prepare for and Mitigate Foreign In
https://www.cisa.gov/news-events/news/cisa-releases-new-insight-help-c...
Releases New Insight to Help Critical Infrastructure Owners Prepare for and Mitigate Foreign Influence Operations | CISA
https://www.cisa.gov/news-events/directives/ed-21-01-mitigate-solarwin...
ED 21-01: Mitigate SolarWinds Orion Code Compromise | CISA Skip to main content An official website of
Supplemental Direction V1: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnera
https://www.cisa.gov/news-events/directives/supplemental-direction-v1-...
Supplemental Direction V1: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA Skip to
https://www.cisa.gov/news-events/news/cyber-hygiene-helps-organization...
Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities | CISA Skip to main content An official website of the
Supplemental Direction V1: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnera
https://www.cisa.gov/news-events/directives/supplemental-direction-v1-...
Supplemental Direction V1: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA Skip to
Supplemental Direction V2: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnera
https://www.cisa.gov/news-events/directives/supplemental-direction-v2-...
Supplemental Direction V2: ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA Skip to
https://www.cisa.gov/news-events/alerts/2025/08/07/cisa-issues-ed-25-0...
CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability | CISA Skip to main content An official website of
CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Pol
https://www.cisa.gov/news-events/news/cisa-issues-emergency-directive-...
CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Policy Secure Vulnerabilities | CISA
CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Pol
https://www.cisa.gov/news-events/news/cisa-issues-emergency-directive-...
CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Ivanti Connect Secure and Policy Secure Vulnerabilities | CISA
https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-c...
ED 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities | CISA Skip to main
https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-miti...
ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices | CISA Skip to main
https://www.cisa.gov/news-events/directives
Vulnerabilities May 18, 2022 ED 22-03: Mitigate VMware Vulnerabilities Apr 08, 2022 ED 22-02: Mitigate Apache Log4j Vulnerability (Closed
https://www.cisa.gov/
CISA’s Emergency Directive 25-03 calls federal agencies to identify and mitigate potential compromise of
https://www.cisa.gov
Emergency Directive 26-01 calls on federal agencies to identify, analyze, and mitigate vulnerabilities in F5
https://www.cisa.gov/news-events/news/statement-cisa-director-easterly...
will be reliant on their vendors, and the vendor community must immediately identify, mitigate, and patch
https://www.cisa.gov/shields-up
ready to help organizations prepare for, respond to, and mitigate the impact
https://www.cisa.gov/news-events/news/ict-supply-chain-risk-management...
for effective industry and government collaboration to identify – and mitigate – the very
https://www.cisa.gov/audiences/federal-government
tools, trainings, and information materials to prevent, protect against, and mitigate security incidents. Featured Content
https://www.cisa.gov/about/divisions-offices/integrated-operations-div...
Vision A ready organization positioned to lead CISA’s operations to mitigate risk and enhance
https://www.cisa.gov/news-events/alerts/2022/10/31/cisa-releases-guida...
unable to implement phishing-resistant MFA, CISA recommends using number matching to mitigate MFA fatigue. Although number
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-120a
username and password as the primary authentication method. One approach to mitigate this issue is to
https://www.cisa.gov/news-events/ics-alerts/ics-alert-20-063-01
plan to update, to the latest available patch level to mitigate vulnerabilities for affected
North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public He
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-187a
with ransomware payments and the proactive steps companies can take to mitigate such risks. Specifically, the
https://www.cisa.gov/news-events/alerts/2015/03/06/freak-ssltls-vulner...
its Android OS and Chrome browser for OS X to mitigate the vulnerability
https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guida...
vendors and users to take the following actions. Vendors Immediately identify, mitigate, and update
https://www.cisa.gov/topics/cybersecurity-best-practices/executive-ord...
and are prepared to take uniform steps to identify and mitigate a threat
https://www.cisa.gov/resources-tools/resources/food-and-agriculture-cy...
This checklist highlights the top cyber actions that organizations can take to mitigate cyber risks and
https://www.cisa.gov/stopransomware/how-can-i-protect-against-ransomwa...
of any size could find ways to reduce their risk and mitigate attack vectors. CISA Tabletop
https://www.cisa.gov/resources-tools/programs/Incident-Response-Traini...
accessible systems, how they are exploited by threat actors, and how to mitigate them to prevent
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-108a
20, 2022 Alert Code AA22-108A Summary Actions to take today to mitigate cyber threats to
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-181a
11, 2022 Alert Code AA22-181A Summary Actions to take today to mitigate cyber threats from ransomware
https://www.cisa.gov/news-events/alerts/2015/04/29/top-30-targeted-hig...
threats [ 2 , 3 ]. References [1] Canadian Cyber Incident Response Centre, Top 4 Strategies to Mitigate Targeted Cyber Intrusions [2
https://www.cisa.gov/news-events/ics-advisories/icsa-22-095-01
social engineering attack. Use Microsoft AppLocker or other similar allow list application to help mitigate risk. Information on using
https://www.cisa.gov/topics/cyber-threats-and-advisories/information-s...
with public and private sector partners to identify and help mitigate cyber threats through information
https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-re...
hygiene and hardening measures to prepare for, prevent, and mitigate ransomware incidents. For
https://www.cisa.gov/news-events
PRESS RELEASE CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
to apply the following recommendations to prepare for and mitigate ransomware incidents: Maintain isolated
https://www.cisa.gov/news-events/news/bad-practices-0
Press Release CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities
https://www.cisa.gov/topics/critical-infrastructure-security-and-resil...
and consultations for that sector to identify vulnerabilities and help mitigate incidents, as appropriate. Support
https://www.cisa.gov/topics/election-security/election-security-resour...
security and resilience of election infrastructure by helping stakeholders understand and mitigate risks to elections
https://www.cisa.gov/topics/election-security/protect2024
and no-cost services to help election officials identify vulnerabilities and mitigate them. View All Services
https://www.cisa.gov/shields-up
ready to help organizations prepare for, respond to, and mitigate the impact
https://www.cisa.gov/news-events/ics-advisories/icsa-22-154-01
and/or install malicious code. Instructions to check for and mitigate this condition are available
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-242a
and malware infections. Note: The disruption of QakBot infrastructure does not mitigate other previously installed malware
https://www.cisa.gov/news-events/alerts/2014/01/17/udp-based-amplifica...
packet and packets-per-second anomalies). Mitigation The following steps can help mitigate a DRDoS
https://www.cisa.gov/topics/cyber-threats-and-advisories
and Advisories Resources Services Explore the cybersecurity services CISA offers to help mitigate risks, respond to
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-133a
often requires IT security professionals to balance the need to mitigate vulnerabilities with the
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-152a
December 12, 2023 Alert Code AA22-152A Actions to take today to mitigate cyber threats from Karakurt
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a
our public and private sector partners to identify and help mitigate cyber threats through information
https://www.cisa.gov/audiences/industry
of industrial control systems and operational technology. Alerts & Directives ED 22-03: Mitigate VMware Vulnerabilities CISA has
https://www.cisa.gov/audiences/small-and-medium-businesses
and build capabilities to prevent, protect against, respond to, and mitigate bombing incidents. Cross-Sector
https://www.cisa.gov/audiences/state-local-tribal-and-territorial-gove...
for State, Local, Tribal, and Territorial Officials. Alerts & Directives ED 22-03: Mitigate VMware Vulnerabilities CISA has
https://www.cisa.gov/audiences/faith-based-community
Faith-Based Communities Actionable recommendations and resources to help faith-based communities mitigate the threat
https://www.cisa.gov/topics/physical-security
for all audiences to prevent, protect against, respond to, and mitigate security incidents. Featured Content
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-223a
11, 2022 Alert Code AA22-223A Summary Actions to take today to mitigate cyber threats from ransomware
https://www.cisa.gov/news-events/directives
Vulnerabilities May 18, 2022 ED 22-03: Mitigate VMware Vulnerabilities Apr 08, 2022 ED 22-02: Mitigate Apache Log4j Vulnerability (Closed
https://www.cisa.gov/news-events/news/cisa-hhs-release-collaborative-c...
Press Release CISA Issues Emergency Directive Requiring Federal Agencies to Identify and Mitigate Cisco Zero-Day Vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a
Cybersecurity Best Practices Actions for Organizations to Take Today to Mitigate Malicious Cyber Activity Maintain
https://www.cisa.gov/stopransomware/ransomware-guide
data extortion, including best practices to prepare for, prevent, and mitigate these incidents. Prevention best
https://www.cisa.gov/audiences/small-and-medium-businesses
and build capabilities to prevent, protect against, respond to, and mitigate bombing incidents. Cross-Sector
https://www.cisa.gov/audiences/educational-institutions
from CISA and other federal agencies to help schools prevent, protect against, mitigate, respond to, and
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a
FBI recommend organizations apply the following recommendations to prepare for, mitigate/prevent, and respond
https://www.cisa.gov/topics/risk-management
of decision making. While risk cannot always be eliminated, actions can be taken to mitigate risk. Since the
https://www.cisa.gov/stopransomware/misconfigurations-and-weaknesses-k...
a target system through weak or compromised RDP credentials. An effective way to mitigate weaknesses in RDP
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a
and Advisories Actions for Organizations to Take Today to Mitigate Cyber Threats Related to
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-289a
for CVE-2023-22515.[ 1 ] While Atlassian’s advisory provides interim measures to temporarily mitigate known attack vectors, CISA
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-110a
cybersecurity authorities urge critical infrastructure network defenders to prepare for and mitigate potential cyber threats—including
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-099a
Summary . Following the CISA and NCSC advice set out below will help mitigate the risk
https://www.cisa.gov/audiences/educational-institutions
from CISA and other federal agencies to help schools prevent, protect against, mitigate, respond to, and
https://www.cisa.gov/topics/critical-infrastructure-security-and-resil...
prioritizes, and protects manufacturing industries with national significance to prevent and mitigate the impact
https://www.cisa.gov/news-events/news/ict-supply-chain-risk-management...
for effective industry and government collaboration to identify – and mitigate – the very
CISA, NSA, FBI and International Cyber Authorities Issue Cybersecurity Advisory to Protect Managed S
https://www.cisa.gov/news-events/news/cisa-nsa-fbi-and-international-c...
weakest point. Organisations need to ensure they are implementing effective controls to mitigate the risk
https://www.cisa.gov/stopransomware/ive-been-hit-ransomware
stakeholders with an understanding of what they can provide to help you mitigate, respond to, and
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-031a
ioc-scanner-CVE-2019-19781/releases/tag/v1.2 Follow instructions from Citrix to mitigate the vulnerability
https://www.cisa.gov/resources-tools/programs/national-cybersecurity-p...
Impact Assessments (PIAs) are conducted on each CISA program to identify and mitigate privacy risks at the
U.S. and International Partners Release Advisory Warning of PRC State-Sponsored Cyber Activity | CIS
https://www.cisa.gov/news-events/news/us-and-international-partners-re...
and it gives network defenders important insights into how to detect and mitigate this malicious activity. As
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-057a
the cloud environment and includes advice to detect and mitigate this activity. To
https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-339a
known APT tactics. Additional strategies and best practices will be required to mitigate the occurrence
https://www.cisa.gov/spotlight
ready to help organizations prepare for, respond to, and mitigate the impact
Release Cybersecurity Guidance on Chinese-Manufactured UAS for Critical Infrastructure Owners and Op
https://www.cisa.gov/news-events/news/release-cybersecurity-guidance-c...
UAS to review the guidance and take action to mitigate risk. We must work
https://www.cisa.gov/resources-tools/training/limit-your-digital-footp...
and security. ( Project Upskill Topic 4.1 for guidance .) Understand and mitigate the risks
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-0...
Vulnerability Instructions Guide based on the user’s specific system configuration to mitigate the vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a
Incident Detection, Response, and Prevention Actions to take today to mitigate against the threat
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a
Cybersecurity Best Practices Actions for Organizations to Take Today to Mitigate Malicious Cyber Activity Maintain
Release Cybersecurity Guidance on Chinese-Manufactured UAS for Critical Infrastructure Owners and Op
https://www.cisa.gov/news-events/news/release-cybersecurity-guidance-c...
UAS to review the guidance and take action to mitigate risk. We must work
https://www.cisa.gov/stopransomware/general-information
protected systems, hosts, and networks. Discover how technology can be used to mitigate phishing attacks and
https://www.cisa.gov/news-events/news/cisa-nsa-and-nist-publish-new-re...
Malign Influence Operations Apr 11, 2024 Press Release CISA Directs Federal Agencies to Immediately Mitigate Significant Risk From Russian
https://www.cisa.gov/news-events/news/cisa-hhs-release-collaborative-c...
Malign Influence Operations Apr 11, 2024 Press Release CISA Directs Federal Agencies to Immediately Mitigate Significant Risk From Russian
https://www.cisa.gov/news-events/news/dhs-cisa-and-uk-ncsc-release-joi...
Malign Influence Operations Apr 11, 2024 Press Release CISA Directs Federal Agencies to Immediately Mitigate Significant Risk From Russian
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a
Incident Detection, Response, and Prevention Actions to take today to mitigate against the threat
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
Resilience , Cyber Threats and Advisories Actions to take today to mitigate Volt Typhoon activity: Apply
https://www.cisa.gov/topics/cybersecurity-best-practices/healthcare
You Can Do OBSERVE the activity ACT by taking local steps to mitigate the threat
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a
Incident Detection, Response, and Prevention Actions to take today to mitigate cyber threats from Akira
Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers | CIS
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-339a
topics: Cyber Threats and Advisories Actions to take today to mitigate malicious cyber activity: Prioritize
NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Cont
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-205a
Shodan, to discover internet-accessible OT devices. Take corrective actions to eliminate or mitigate internet-accessible connections immediately
https://www.cisa.gov/doing-business-cisa
leadership of Director Jen Easterly , CISA works to understand, manage, and mitigate risk to the
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-057a
the cloud environment and includes advice to detect and mitigate this activity. To