Filter by Topic

81 Results Found
31 - 40 of 81 results
Election Security Spotlight – Endpoint Detection and Response (EDR)
Published on 01.15.2021
Election Security Spotlight – Endpoint Detection and Response (EDR)
What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...

Election Security Spotlight – Virtual Private Network (VPN) for Election Offices
Published on 12.18.2020
Election Security Spotlight – Virtual Private Network (VPN) for Election Offices
What it is Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote netwo...

Election Security Spotlight – Election 2020: Conducting After Action Reviews
Published on 11.20.2020
Election Security Spotlight – Election 2020: Conducting After Action Reviews
What it is An After Action Review (AAR) is a retrospective analysis performed after an event. AARs are used by election offices to study and impr...

Election Security Spotlight – Secure Web Browsing
Published on 10.17.2020
Election Security Spotlight – Secure Web Browsing
What it is: Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vuln...

Election Security Spotlight – Disinformation and Misinformation
Published on 09.25.2020
Election Security Spotlight – Disinformation and Misinformation
What it is: Disinformation is false or inaccurate information deliberately spread with malicious intent, while misinformation is its unintention...

Election Security Spotlight – Domain Name System (DNS)
Published on 07.17.2020
Election Security Spotlight – Domain Name System (DNS)
What it is: The Domain Name System (DNS) converts domain names (ex: www.example[.]com) that users enter into a web browser to Internet Protocol (...

Election Security Spotlight – Cloud Computing
Published on 06.16.2020
Election Security Spotlight – Cloud Computing
What it is: Cloud computing is the storing, accessing and delivering of data, programs, and other computing services on the internet rather than ...

Election Security Spotlight – Cyber Threat Indicator Sharing
Published on 05.19.2020
Election Security Spotlight – Cyber Threat Indicator Sharing
What it is: Cyber threat indicator sharing is the practice of exchanging actionable threat intelligence between organizations. The information sh...

Election Security Spotlight – Internet of Things (IoT)
Published on 04.13.2020
Election Security Spotlight – Internet of Things (IoT)
What it is:   The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are conne...

Election Security Spotlight – Signature-Based vs Anomaly-Based Detection
Published on 03.14.2020
Election Security Spotlight – Signature-Based vs Anomaly-Based Detection
What it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions