Publications

Featured publications

2024 Report on the State of the Cybersecurity in the Union

This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…

ENISA Threat Landscape 2024

ENISA Threat Landscape (ETL) report is an annual report on the status of the cybersecurity threat landscape that identifies prime threats, major trends observed with respect to threats, threat actors and attack techniques, and also describes…

Best Practices for Cyber Crisis Management

This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends…

All publications

Publish Date

Roadmap to provide more proactive and efficient CERT training

The roadmap identifies 10 proposals on how ENISA could improve CERT training and exercises in Europe. The ideas in the document are valuable, as they reflect the actual community needs and requirements and there could be mutual benefit from both…

EU Cyber Cooperation-The Digital Frontline

We all share a common interest in guaranteeing a free, safe and sound life in cyberspace. ENISA firmly believes EU cyber cooperation is crucial to establishing a proficient and coherent approach to Network and Information Security (NIS). This…

Involving Intermediaries in Cyber-security Awareness Raising

This document summarises the work carried out to involve intermediaries in cyber-security awareness raising by the European Commission and the European Network and Information Security Agency in cooperation with the United States Department of…

Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime

In 2010 ENISA started its support for operational collaboration between the Computer Emergency Response Teams (CERTs) in the Member States on the one hand and Law Enforcing Agencies (LEA) on the other hand. Various activities have since been…

Proactive detection of security incidents II - Honeypots

An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets.…

The right to be forgotten - between expectations and practice

The right to be forgotten is included in the proposed regulation on data protection published by the European Commission in January 2012. The regulation is still to be adopted by the European Parliament for entering into force. The different legal…

Privacy considerations of online behavioural tracking

Internet users are being increasingly tracked and profiled and their personal data are extensively used as currency in exchange for services. It is important that this new reality is better understood by all stakeholders if we are to be able to…

National and International Cyber Security Exercises: Survey, Analysis & Recommendations

Cyber exercises are an important tool to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure incidents. ENISA supports the stakeholders involved in EU cyber exercises. This report…

Consumerization of IT: Top Risks and Opportunities

This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent…

EISAS - Enhanced Roadmap 2012

The EISAS Enhanced Roadmap 2012 take account of the results of the EISAS Large scale pilot and foresee the next steps required for a full deployment of EISAS in the EU.