Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profileg
Cybersecurity and Infrastructure Security Agency

@CISAgov

America's Cyber Defense Agency and National Coordinator for critical infrastructure security & resilience. Likes, RTs, follows ≠ endorsements.

ID:964227358218649600

linkhttp://cisa.gov calendar_today15-02-2018 19:58:11

7,8K Tweets

278,0K Followers

109 Following

Follow People
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Congrats UConn Men's Basketball! While fans enjoyed an exciting NCAA Men's Final Four championship game at State Farm Stadium, our Region 9 team, along with partners, provided on-site incident management & security support, and monitored potential threats to the venue & nearby critical infrastructure.

Congrats @UConnMBB! While fans enjoyed an exciting @MFinalFour championship game at @StateFarmStdm, our Region 9 team, along with partners, provided on-site incident management & security support, and monitored potential threats to the venue & nearby critical infrastructure.
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Happy ! This April we are prioritizing the people who support the systems on which we rely and highlighting the role of emergency communications as a vital function. cisa.gov/emergency-comm…

account_circle
FEMA(@fema) 's Twitter Profile Photo

Business organizations: Join our next business & industry call on April 30. We're working with AT&T, @Argonne, & Cybersecurity and Infrastructure Security Agency experts to showcase resiliency tools that can be used during disaster emergencies.

To register, visit: bit.ly/AprilBICall or scan the QR code below.

Business organizations: Join our next business & industry call on April 30. We're working with @ATT, @Argonne, & @CISAgov experts to showcase resiliency tools that can be used during disaster emergencies. To register, visit: bit.ly/AprilBICall or scan the QR code below.
account_circle
Jen Easterly🛡️(@CISAJen) 's Twitter Profile Photo

Happy 10th Birthday to WiCyS! Over the past decade,
Women in CyberSecurity (WiCyS) has fostered a vibrant community that connects and empowers women in cyber, strengthening our cyber workforce and our national cyber defense. To celebrate, I called in a few friends!

account_circle
CISA Cyber(@CISACyber) 's Twitter Profile Photo

🚩Palo Alto Networks has released workaround guidance for a command injection vulnerability (CVE-2024-3400) affecting PAN-OS versions 10.2, 11.0 & 11.1. Apply workarounds asap 👉 cisa.gov/news-events/al…

account_circle
CISA Cyber(@CISACyber) 's Twitter Profile Photo

🛡️ Palo Alto Networks PAN-OS users: We added -2024-3400, a command injection vulnerability in GlobalProtect Gateway, to our Known Exploited Vulnerabilities Catalog. Apply mitigations to protect your org from cyberattacks. go.dhs.gov/Z3Q

🛡️ Palo Alto Networks PAN-OS users: We added #CVE-2024-3400, a command injection vulnerability in GlobalProtect Gateway, to our Known Exploited Vulnerabilities Catalog. Apply mitigations to protect your org from cyberattacks. go.dhs.gov/Z3Q #Cybersecurity #InfoSec
account_circle
CISA Cyber(@CISACyber) 's Twitter Profile Photo

🛡️D-Link users: We added -2024-3272 & CVE-2024-3273 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks.

🛡️D-Link users: We added #CVE-2024-3272 & CVE-2024-3273 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

CISA advisors Jack Cable and æva black describe in our latest blog how we are responding to the XZ Utils compromise and how every tech manufacturer should take a approach to securing open source software: go.dhs.gov/JHf

CISA advisors @jackhcable and @aevavoom describe in our latest blog how we are responding to the XZ Utils compromise and how every tech manufacturer should take a #SecureByDesign approach to securing open source software: go.dhs.gov/JHf
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Don’t miss the next webinar on April 29 where several female leaders in will speak on their own unique challenges and their efforts to foster a more inclusive and diverse workforce. ⚖️🧪🚨 Contact [email protected] for information.

Don’t miss the next #GlobalChemCongress webinar on April 29 where several female leaders in #chemicalsecurity will speak on their own unique challenges and their efforts to foster a more inclusive and diverse workforce. ⚖️🧪🚨 Contact chemcongress@interpol.int for information.
account_circle
Jen Easterly🛡️(@CISAJen) 's Twitter Profile Photo

Russian nation-state actors targeted Microsoft corporate email accounts & correspondence w/federal civilian agencies (more below in ED 24-02). Of note, password spraying was used to compromise systems—why strong passwords & MFA are critical. More at cisa.gov/SecureOurWorld

account_circle
Jen Easterly🛡️(@CISAJen) 's Twitter Profile Photo

Great to spend time in Nashville w/the fabulous Women in CyberSecurity (WiCyS) team as part of their 10th Anniversary Celebration. I’m so inspired by WiCyS’ mission to recruit, retrain & advance women in cybersecurity. Congrats to Ambareen & Lynn Dohm | WiCyS ♥️Cybersecurity and Infrastructure Security Agency is so proud to partner with you! 50x30!

Great to spend time in Nashville w/the fabulous @WiCySorg team as part of their 10th Anniversary Celebration. I’m so inspired by WiCyS’ mission to recruit, retrain & advance women in cybersecurity. Congrats to Ambareen & @lynn_dohm—@CISAgov is so proud to partner with you! 50x30!
account_circle
Cyber Statecraft(@CyberStatecraft) 's Twitter Profile Photo

🚨Event Alert🚨

Register today for 'The Secure by Design Imperative' on April 25.

This virtual panel will include folks from Cybersecurity and Infrastructure Security Agency, as well as Dan Lorenc of Chainguard ⛓️ about secure-by-design practices & the path ahead for industry.

atlanticcouncil.org/event/the-secu…

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

The Interagency Security Committee (ISC) released its 2023 Annual Review. This publication provides an overview of the ISC’s activities and accomplishments over the course of 2023, as well as plans for 2024. go.dhs.gov/Jrd

The Interagency Security Committee (ISC) released its 2023 Annual Review. This publication provides an overview of the ISC’s activities and accomplishments over the course of 2023, as well as plans for 2024. go.dhs.gov/Jrd
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

We publicly issued Emergency Directive (ED) 24-02 which requires emergency action by fed civilian agencies after Russian state-sponsored actors compromised Microsoft's corporate email system: go.dhs.gov/JrK We encourage all orgs to take steps to mitigate their risk.

We publicly issued Emergency Directive (ED) 24-02 which requires emergency action by fed civilian agencies after Russian state-sponsored actors compromised Microsoft's corporate email system: go.dhs.gov/JrK We encourage all orgs to take steps to mitigate their risk.
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Mona Harrington, our Assistant Director for the National Risk Management Center (NRMC), joined USCYBERCOM Cybersecurity Alert and private sector leaders to share insights on partnering to protect critical infrastructure in the digital age. Learn more about the NRMC: cisa.gov/nrmc

Mona Harrington, our Assistant Director for the National Risk Management Center (NRMC), joined @CNMF_CyberAlert and private sector leaders to share insights on partnering to protect critical infrastructure in the digital age. Learn more about the NRMC: cisa.gov/nrmc
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Time is running out to apply for our Public Affairs Specialist position in Arlington⏰ This is a great opportunity to join our team and support the agency's media engagement efforts! usajobs.gov/job/783597800

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Supervisory Cybersecurity Advisor, May Acosta spoke at the Nevada Public Sector Cybersecurity Summit in Reno! Along with our partners, they highlighted the importance of cybersecurity, grant application processes, & other services.

Supervisory Cybersecurity Advisor, May Acosta spoke at the Nevada Public Sector Cybersecurity Summit in Reno! Along with our partners, they highlighted the importance of cybersecurity, grant application processes, & other services.
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

“As part of the National Risk Management Center, I work to understand and mitigate the risk space weather phenomena poses to our critical infrastructure.”
- Megan Spear, Management and Program Analyst

“As part of the National Risk Management Center, I work to understand and mitigate the risk space weather phenomena poses to our critical infrastructure.” - Megan Spear, Management and Program Analyst #WorkforceWednesday
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Malware Next-Gen Analysis allows any org to submit malware samples and other suspicious artifacts for analysis. It enables us to more effectively support our partners by automating analysis of newly identified malware and enhancing cyber defense efforts. go.dhs.gov/JrN

Malware Next-Gen Analysis allows any org to submit malware samples and other suspicious artifacts for analysis. It enables us to more effectively support our partners by automating analysis of newly identified malware and enhancing cyber defense efforts. go.dhs.gov/JrN
account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

Kevin is always on the go and needs his devices to work for him. 💻 To keep them in shape and up to date, he uses FOUR EASY TIPS from 📶🌎 To keep YOUR DEVICES SAFE go to cisa.gov/SecureOurWorld

Kevin is always on the go and needs his devices to work for him. 💻 To keep them in shape and up to date, he uses FOUR EASY TIPS from #SecureOurWorld 📶🌎 To keep YOUR DEVICES SAFE go to cisa.gov/SecureOurWorld
account_circle