Publications

Featured publications

2024 Report on the State of the Cybersecurity in the Union

This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…

ENISA Threat Landscape 2024

ENISA Threat Landscape (ETL) report is an annual report on the status of the cybersecurity threat landscape that identifies prime threats, major trends observed with respect to threats, threat actors and attack techniques, and also describes…

Best Practices for Cyber Crisis Management

This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends…

All publications

Publish Date

Secure Communication with the CERTs & Other Stakeholders

The main objective of the project “Secure Communications with the CERTs and other Stakeholders”, which is one of the ENISA activities related to reinforcing communications between CERTs in the Member States, is the preparation work for a report on…

CERT Operational Gaps and Overlaps

This document analyses the operational gaps and overlaps of national/governmental CERTs and provides some reccomendations. Recommendations made in this report represent the results of the analysis of input gathered from the relevant external…

The Use of Cryptographic Techniques in Europe

With the increased use of e-Government services, the amount of citizens’ sensitive data being transmitted over public networks (e.g. the Internet) and stored within applications that are accessible from anywhere on the Internet has grown…

Trust and Reputation Models

Reputation systems are a key success factor of many websites, enabling users and customers to have a better understanding of the information, products and services being provided. However, by using reputation systems, individuals place themselves at…

EISAS Basic toolset

This study describes how EU Member States can deploy the European Information Sharing and Alert System (EISAS) framework for its target group comprised of citizens and small & medium enterprises (SMEs). The report highlights the way to reach…

EISAS (enhanced) report on implementation

The 'EISAS (enhanced) report is an implementation plan for further development and deployment of EISAS concept. It's a 'how-to' method for implementing a fully functional EISAS framework until 2013 in the European Union Member States.

Desktop Reserach on Public Private Partnerships

In many Member States public and private organizations co-operate through Public Private Partnerships (PPPs) in order to address CIIP. There is no common definition of what constitutes a PPP. Diversity is valuable yet there also exists a need for…

Good Practice Guide on Cooperative Models for Effective PPPs

This Good Practice Guide on Cooperative Models for Effective Public Private Partnerships (PPPs) classifies PPPs for security and resilience and reveals the main five components addressing Why, Who, How, What and When questions associated with…

Cyber-bullying and online grooming: helping to protect against the risks

Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular,…