Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
81 Results Found
31 - 40 of 81 results
Published on 01.15.2021
Election Security Spotlight – Endpoint Detection and Response (EDR)What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...
Published on 12.18.2020
Election Security Spotlight – Virtual Private Network (VPN) for Election OfficesWhat it is Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote netwo...
Published on 11.20.2020
Election Security Spotlight – Election 2020: Conducting After Action ReviewsWhat it is An After Action Review (AAR) is a retrospective analysis performed after an event. AARs are used by election offices to study and impr...
Published on 10.17.2020
Election Security Spotlight – Secure Web BrowsingWhat it is: Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vuln...
Published on 09.25.2020
Election Security Spotlight – Disinformation and MisinformationWhat it is: Disinformation is false or inaccurate information deliberately spread with malicious intent, while misinformation is its unintention...
Published on 07.17.2020
Election Security Spotlight – Domain Name System (DNS)What it is: The Domain Name System (DNS) converts domain names (ex: www.example[.]com) that users enter into a web browser to Internet Protocol (...
Published on 06.16.2020
Election Security Spotlight – Cloud ComputingWhat it is: Cloud computing is the storing, accessing and delivering of data, programs, and other computing services on the internet rather than ...
Published on 05.19.2020
Election Security Spotlight – Cyber Threat Indicator SharingWhat it is: Cyber threat indicator sharing is the practice of exchanging actionable threat intelligence between organizations. The information sh...
Published on 04.13.2020
Election Security Spotlight – Internet of Things (IoT)What it is: The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are conne...
Published on 03.14.2020
Election Security Spotlight – Signature-Based vs Anomaly-Based DetectionWhat it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More