Spotlights
Dive into cybersecurity topics for the election community
Filter
83 Results Found
Solutions
Industry
31 - 40 of 83 results
Published on 04.16.2021
A Vulnerability Disclosure Program (VDP) is a way for an organization to enable outside researchers to test its systems and report vulnerabilitie...
Published on 03.16.2021
What is a Managed Service Provider? A Managed Service Provider (MSP) is a vendor that offers IT management to ensure workstations, servers, and n...
Published on 02.12.2021
What are Open Source Products? Open source products are applications and software that have their underlying code (the building blocks of the pro...
Published on 01.15.2021
What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...
Published on 12.18.2020
What it is Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote netwo...
Published on 11.20.2020
What it is An After Action Review (AAR) is a retrospective analysis performed after an event. AARs are used by election offices to study and impr...
Published on 10.17.2020
What it is: Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vuln...
Published on 09.25.2020
What it is: Disinformation is false or inaccurate information deliberately spread with malicious intent, while misinformation is its unintention...
Published on 07.17.2020
What it is: The Domain Name System (DNS) converts domain names (ex: www.example[.]com) that users enter into a web browser to Internet Protocol (...
Published on 06.16.2020
What it is: Cloud computing is the storing, accessing and delivering of data, programs, and other computing services on the internet rather than ...
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More