Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
81 Results Found
41 - 50 of 81 results
Published on 02.15.2020
Election Security Spotlight – Common Cyber Hoax ScamsWhat it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...
Published on 01.24.2020
Election Security Spotlight – Website DefacementsWhat it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...
Published on 12.13.2019
Election Security Spotlight – Zero-day Exploits and VulnerabilitiesWhat it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...
Published on 11.25.2019
Election Security Spotlight – Disaster Recovery Plan (DRP)What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...
Published on 10.11.2019
Election Security Spotlight – Defense in Depth (DiD)What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfu...
Published on 09.13.2019
Election Security Spotlight – Hardware, Software, and FirmwareWhat it is: Hardware, software, and firmware are the three core components that make up present-day computers and systems. Hardware includes the ...
Published on 08.16.2019
Election Security Spotlight – Top-Level Domains (TLD)What it is: A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediate...
Published on 06.28.2019
Election Security Spotlight – Internet ProtocolWhat it is: Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet. ...
Published on 06.21.2019
Election Security Spotlight – Cyber Threat ActorsWhat it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile acti...
Published on 05.28.2019
Election Security Spotlight – Verizon Data Breach Report 2019What it is The Verizon Data Breach Investigations Report (DBIR) is an annual report produced by the Verizon Threat Research Advisory Center (VTRA...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More