Filter by Topic

81 Results Found
41 - 50 of 81 results
Election Security Spotlight – Common Cyber Hoax Scams
Published on 02.15.2020
Election Security Spotlight – Common Cyber Hoax Scams
What it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...

Election Security Spotlight – Website Defacements
Published on 01.24.2020
Election Security Spotlight – Website Defacements
What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...

Election Security Spotlight – Zero-day Exploits and Vulnerabilities
Published on 12.13.2019
Election Security Spotlight – Zero-day Exploits and Vulnerabilities
What it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...

Election Security Spotlight – Disaster Recovery Plan (DRP)
Published on 11.25.2019
Election Security Spotlight – Disaster Recovery Plan (DRP)
What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...

Election Security Spotlight – Defense in Depth (DiD)
Published on 10.11.2019
Election Security Spotlight – Defense in Depth (DiD)
What it is: Defense in Depth (DiD) refers to an information security approach in which a series of security mechanisms and controls are thoughtfu...

Election Security Spotlight – Hardware, Software, and Firmware
Published on 09.13.2019
Election Security Spotlight – Hardware, Software, and Firmware
What it is: Hardware, software, and firmware are the three core components that make up present-day computers and systems. Hardware includes the ...

Election Security Spotlight – Top-Level Domains (TLD)
Published on 08.16.2019
Election Security Spotlight – Top-Level Domains (TLD)
What it is: A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediate...

Election Security Spotlight – Internet Protocol
Published on 06.28.2019
Election Security Spotlight – Internet Protocol
What it is: Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet. ...

Election Security Spotlight – Cyber Threat Actors
Published on 06.21.2019
Election Security Spotlight – Cyber Threat Actors
What it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile acti...

Election Security Spotlight – Verizon Data Breach Report 2019
Published on 05.28.2019
Election Security Spotlight – Verizon Data Breach Report 2019
What it is The Verizon Data Breach Investigations Report (DBIR) is an annual report produced by the Verizon Threat Research Advisory Center (VTRA...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions