Filter by Topic

85 Results Found
31 - 40 of 85 results
Election Security Spotlight – Why Election Offices Should Perform Security Assessments
Published on 06.01.2021
Election Security Spotlight – Why Election Offices Should Perform Security Assessments
A security assessment is a thorough, proactive study of an organization’s systems that helps identify security challenges and implement solutions...

Election Security Spotlight – What Is A Vulnerability Disclosure Program?
Published on 04.16.2021
Election Security Spotlight – What Is A Vulnerability Disclosure Program?
A Vulnerability Disclosure Program (VDP) is a way for an organization to enable outside researchers to test its systems and report vulnerabilitie...

Election Security Spotlight – What is a Managed Service Provider?
Published on 03.16.2021
Election Security Spotlight – What is a Managed Service Provider?
What is a Managed Service Provider? A Managed Service Provider (MSP) is a vendor that offers IT management to ensure workstations, servers, and n...

Election Security Spotlight – Open Source Products
Published on 02.12.2021
Election Security Spotlight – Open Source Products
What are Open Source Products? Open source products are applications and software that have their underlying code (the building blocks of the pro...

Election Security Spotlight – Endpoint Detection and Response (EDR)
Published on 01.15.2021
Election Security Spotlight – Endpoint Detection and Response (EDR)
What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...

Election Security Spotlight – Virtual Private Network (VPN) for Election Offices
Published on 12.18.2020
Election Security Spotlight – Virtual Private Network (VPN) for Election Offices
What it is Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote netwo...

Election Security Spotlight – Election 2020: Conducting After Action Reviews
Published on 11.20.2020
Election Security Spotlight – Election 2020: Conducting After Action Reviews
What it is An After Action Review (AAR) is a retrospective analysis performed after an event. AARs are used by election offices to study and impr...

Election Security Spotlight – Secure Web Browsing
Published on 10.17.2020
Election Security Spotlight – Secure Web Browsing
What it is: Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vuln...

Election Security Spotlight – Disinformation and Misinformation
Published on 09.25.2020
Election Security Spotlight – Disinformation and Misinformation
What it is: Disinformation is false or inaccurate information deliberately spread with malicious intent, while misinformation is its unintention...

Election Security Spotlight – Domain Name System (DNS)
Published on 07.17.2020
Election Security Spotlight – Domain Name System (DNS)
What it is: The Domain Name System (DNS) converts domain names (ex: www.example[.]com) that users enter into a web browser to Internet Protocol (...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions