Close this search box.

We are creating some awesome events for you. Kindly bear with us.

CISA, U.S. Posts Catalogue of Free Cyber Services

3d white person. Antivirus metaphor. Knight fighting worm virus. 3d image. Isolated white background.

The Cybersecurity and Infrastructure Security Agency (CISA) has collected and published a list of free cybersecurity services and tools to help organisations of all sizes reduce their cybersecurity risk. The webpage was published to be the front door of starting point for a one-stop-shop for free services tools from CISA, the open-source community and private- and public-sector organisations including Joint Cyber Defence Collaborative partners.

The initial list includes services and tools from CISA, open-source community, and private and public sector organisations across the cybersecurity community including  Joint Cyber Defense Collaborative (JCDC) partners. The list is organised to align with CISA’s recent advisory on:

  • Reducing the likelihood of a damaging cyber incident, including by preventing devices from connecting to malicious sites and scanning for security weaknesses and vulnerabilities. Validate that all remote access to the organisation’s network and privileged or administrative access

requires multi-factor authentication. Confirm that the organisation’s IT personnel have disabled all ports and protocols that are not essential for business purposes.

  • Detecting malicious activity quickly, including by deploying network intrusion detection and prevention, undertaking penetration testing, and improving endpoint detections. Ensure that cybersecurity/IT personnel are focused on identifying and quickly assessing any unexpected or unusual network behaviour. Enable logging to better investigate issues or events. If the organisation is using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in CISA’s guidance.
  • Responding effectively to confirmed incidents, including through collection and analysis of malware and other artefacts. Designate a crisis-response team with main points of contact for a suspected cybersecurity incident and roles/responsibilities within the organisation, including technology, communications, legal and business continuity. Assure availability of key personnel; identify means to provide surge support for responding to an incident.
  • Maximising resilience, including by automating system backups and enhancing threat modelling. Test backup procedures to ensure that critical data can be rapidly restored if the organisation is impacted by ransomware or a destructive cyberattack; ensure that backups are isolated from network connections.

CISA also includes the foundational measures that it says are key to implementing a strong cybersecurity program: fixing known software flaws, implementing multifactor authentication, eliminating bad practices, signing up for CISA’s automated cyber hygiene vulnerability scanning and removing connected devices from internet-of-things search engines via Get Your S.O.S.

Many organisations, both public and private, are target-rich and resource-poor. The resources on this list will help such organisations improve their security posture, which is particularly critical in the current heightened threat environment. This initial catalogue will grow and mature as we include additional free tools from other partners

As reported by OpenGov Asia, with the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, as well as private sector organisations, the United States needs trustworthy secure systems has never been more important to the long-term economic and national security interests. Engineering-based solutions are essential to managing the complexity, dynamicity, and interconnectedness of today’s systems.

National Institute of Standards and Technology (NIST) titled “Engineering Trustworthy Secure Systems”, addresses the engineering-driven perspective and actions necessary to develop more defensible and survivable systems, inclusive of the machine, physical, and human components that compose those systems and the capabilities and services delivered by those systems.

The need for trustworthy secure systems stems from the adverse effects associated with a diverse set of stakeholder needs that are driven by mission, business, and other objectives and concerns. The characteristics of these systems reflect a growth in the geographic size, number, and types of components and technologies that compose the systems; the complexity and dynamicity in the behaviours and outcomes of the systems; and the increased dependence that results in a range of consequences from major inconvenience to catastrophic loss due to adversity within the global operating environment.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.