Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
85 Results Found
41 - 50 of 85 results
Published on 06.16.2020
Election Security Spotlight – Cloud ComputingWhat it is: Cloud computing is the storing, accessing and delivering of data, programs, and other computing services on the internet rather than ...
Published on 05.19.2020
Election Security Spotlight – Cyber Threat Indicator SharingWhat it is: Cyber threat indicator sharing is the practice of exchanging actionable threat intelligence between organizations. The information sh...
Published on 04.13.2020
Election Security Spotlight – Internet of Things (IoT)What it is: The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are conne...
Published on 03.14.2020
Election Security Spotlight – Signature-Based vs Anomaly-Based DetectionWhat it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...
Published on 02.15.2020
Election Security Spotlight – Common Cyber Hoax ScamsWhat it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...
Published on 01.24.2020
Election Security Spotlight – Website DefacementsWhat it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...
Published on 12.13.2019
Election Security Spotlight – Zero-day Exploits and VulnerabilitiesWhat it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...
Published on 11.25.2019
Election Security Spotlight – Disaster Recovery Plan (DRP)What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...
Published on 10.11.2019
Election Security Spotlight – Defense in Depth (DiD)What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfu...
Published on 09.13.2019
Election Security Spotlight – Hardware, Software, and FirmwareWhat it is: Hardware, software, and firmware are the three core components that make up present-day computers and systems. Hardware includes the ...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More