Spotlights
Dive into cybersecurity topics for the election community
Filter by Topic
85 Results Found
11 - 20 of 85 results
Published on 01.09.2024
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses the dangers of QR c...
Published on 12.12.2023
In this Election Security Spotlight, the EI-ISAC discusses a new resource for navigating the election technology procurement process.
Published on 10.13.2023
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) provides an overview of swatt...
Published on 09.25.2023
In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) discusses social media securit...
Published on 09.25.2023
In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) provides an overview of email ...
Published on 09.25.2023
In this Election Security Spotlight, the EI-ISAC explains the impact of generative AI on elections and why it matters.
Published on 09.25.2023
In this Election Security Spotlight, the EI-ISAC provides some physical security tips for protecting the staff and equipment at your election off...
Published on 06.16.2023
In this Election Security Spotlight, the EI-ISAC explains the value of an election office using the .gov domain for its website.
Published on 03.17.2023
In this Election Security Spotlight, we provide an overview of the Malicious Domain Blocking and Reporting Plus (MDBR+) service.
Published on 02.17.2023
In this Election Security Spotlight, the Elections Infrastructure Information Sharing an Analysis Center (EI-ISAC) answers the question: "What is...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More