IoT Cybersecurity: Webinar Series to Tackle Security Challenges of IoT
The EU Agency for Cybersecurity, Europol and CERT-EU team up to identify the main security risks of IoT and to work towards achieving a more secure IoT ecosystem across Europe.
International Cybersecurity Challenge: Let's Cheer for Team Europe!
The European Union Agency for Cybersecurity (ENISA) welcomes the new Team Europe to compete in the 2nd International Cybersecurity Challenge (ICC) to take place in the United States .
Prague hosts a meeting of the best European talents in cybersecurity
The European Cyber Security Challenge (ECSC) is a major European competition held annually in one of the EU countries and as such is a key activity of the European Union Agency for Cybersecurity (ENISA).
Artificial Intelligence: an opportunity for cyber-crisis management in the EU
On 3 and 4 June 2019, the EU Agency for Cybersecurity, ENISA organised a conference in Athens, which focused on the future of the EU cyber-crisis management. The advantages and challenges were identified, particularly where the use of artificial…
European Rail: Report unveils challenges and stresses the need for investment in cybersecurity
Basic protection measures are no longer enough. More cybersecurity expertise is needed to build up secure digital capacities for Europe’s rail sector to charge forward.
European Cybersecurity Month: highlights of the 2019 Campaign
The European Union Agency for Cybersecurity publishes the report on the 2019 European Cybersecurity Month campaign.
ENISA at Bitkom hub-conference: Feeling secure about your smart device?
ENISA participated at the BITKOM hub-conference on the 22nd November 2016 in Berlin.
European Cybersecurity Month (ECSM) 2021: Get Involved and Register Your Event
ECSM, the EU’s annual cybersecurity advocacy campaign will kick off on 1 October 2021. The campaigns’ website opens to the public for event submissions today through the 30 September.
Cybersecurity to the Rescue: Pseudonymisation for Personal Data Protection
ENISA’s new report explores pseudonymisation techniques and use cases for healthcare and information sharing in cybersecurity
Pagination