Publications

Featured publications

NIS2 Technical Implementation Guidance

This report provides technical guidance to support the implementation of the NIS2 Directive for several types of entities in the NIS2 digital infrastructure, ICT service management and digital providers sectors. The…

ENISA NIS360 2024

The NIS360 is a new ENISA product that assesses the maturity and criticality of sectors of high criticality under the NIS2 Directive, providing both a comparative overview and a more in-depth analysis of each sector. The NIS360 is designed to…

2024 Report on the State of the Cybersecurity in the Union

This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…

All publications

Publish Date

ENISA Threat Landscape 2020 - Research topics

In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.

ENISA Threat Landscape 2020 - Information Leakage

The report outlines the findings on information leakage, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided

ENISA Threat Landscape 2020 - Malware

The report provides an overview and findings of malware, identifies trends and proposes actions for malware mitigation.

ENISA Threat Landscape 2020 - Cyber threat intelligence overview

The report assesses the state-of-play of cyber threat intelligence (CTI) as a dynamic cybersecurity domain. This analysis aims to indicate the main trends in the expeditious development of CTI by providing relevant references and summarizing the…

ENISA threat landscape for 5G Networks

This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset diagram…

Good Practices for Security of IoT - Secure Software Development Lifecycle

This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT…

Industry 4.0 - Cybersecurity Challenges and Recommendations

In this short paper ENISA provides identifies the main challenges to the adoption of the security measures and security of Industry 4.0 and Industrial IoT. Moreover, ENISA lists high-level recommendations to different stakeholder groups in order to…

ENISA Threat Landscape Report 2018

2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors

IoT Security Standards Gap Analysis

This study analyses the gaps and provides guidelines for, in particular, the development or repositioning of standards, facilitating the adoption of standards and governance of EU standardisation in the area of NIS.

Exploring the opportunities and limitations of current Threat Intelligence Platforms

The main objective of this report is to understand the limitations of threat information sharing and the analysis tools that are currently in use. Moreover, the second objective is to provide the relevant recommendations so that these limitations…