Filter by Topic

85 Results Found
41 - 50 of 85 results
Election Security Spotlight – Cloud Computing
Published on 06.16.2020
Election Security Spotlight – Cloud Computing
What it is: Cloud computing is the storing, accessing and delivering of data, programs, and other computing services on the internet rather than ...

Election Security Spotlight – Cyber Threat Indicator Sharing
Published on 05.19.2020
Election Security Spotlight – Cyber Threat Indicator Sharing
What it is: Cyber threat indicator sharing is the practice of exchanging actionable threat intelligence between organizations. The information sh...

Election Security Spotlight – Internet of Things (IoT)
Published on 04.13.2020
Election Security Spotlight – Internet of Things (IoT)
What it is:   The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are conne...

Election Security Spotlight – Signature-Based vs Anomaly-Based Detection
Published on 03.14.2020
Election Security Spotlight – Signature-Based vs Anomaly-Based Detection
What it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...

Election Security Spotlight – Common Cyber Hoax Scams
Published on 02.15.2020
Election Security Spotlight – Common Cyber Hoax Scams
What it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...

Election Security Spotlight – Website Defacements
Published on 01.24.2020
Election Security Spotlight – Website Defacements
What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...

Election Security Spotlight – Zero-day Exploits and Vulnerabilities
Published on 12.13.2019
Election Security Spotlight – Zero-day Exploits and Vulnerabilities
What it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...

Election Security Spotlight – Disaster Recovery Plan (DRP)
Published on 11.25.2019
Election Security Spotlight – Disaster Recovery Plan (DRP)
What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...

Election Security Spotlight – Defense in Depth (DiD)
Published on 10.11.2019
Election Security Spotlight – Defense in Depth (DiD)
What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfu...

Election Security Spotlight – Hardware, Software, and Firmware
Published on 09.13.2019
Election Security Spotlight – Hardware, Software, and Firmware
What it is: Hardware, software, and firmware are the three core components that make up present-day computers and systems. Hardware includes the ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions