Spotlights
Dive into cybersecurity topics for the election community
Filter
83 Results Found
Solutions
Industry
41 - 50 of 83 results
Published on 05.19.2020
What it is: Cyber threat indicator sharing is the practice of exchanging actionable threat intelligence between organizations. The information sh...
Published on 04.13.2020
What it is: The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are conne...
Published on 03.14.2020
What it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...
Published on 02.15.2020
What it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...
Published on 01.24.2020
What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...
Published on 12.13.2019
What it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...
Published on 11.25.2019
What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...
Published on 10.11.2019
What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfu...
Published on 09.13.2019
What it is: Hardware, software, and firmware are the three core components that make up present-day computers and systems. Hardware includes the ...
Published on 08.16.2019
What it is: A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediate...
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More