The eIDAS Regulation (EU) No 910/2014, lays down requirements for qualified electronic signature creation devices (QSCD) to ensure the functionality of advanced electronic signatures and seals. In the specific context of QSCD however, security…
Largest cyber security exercise “Cyber Europe 2012’’ report published in 23 languages
ENISA has published the new report of the largest ever pan-Europe cyber security exercise, Cyber Europe 2012, which is available in 23 languages. Almost 600 individual players participated, including actors from the private sector (financial,…
Stock taking on EU Resilience
How do 23 countries in Europe strengthen the resilience of public communication networks? EU Agency presents the first EU-wide survey on policies and regulations.
The EU Agency ENISA presents its first ever EU wide report on “Stock Taking of…
Trust Services & Digital Wallets: Moving to the Cloud and Remote Identity Proofing
In order to address the cybersecurity questions of remote identity proofing, the European Union Agency for Cybersecurity (ENISA) organised a workshop to support the area of Trust Services and Digital Wallets and published a report on moving trust…
European Cyber Security Challenge 2020 - Event Date Change
Upcoming European Cyber Security Challenge dates changed for 2021 in Prague.
Ransomware: Publicly Reported Incidents are only the tip of the iceberg
The threat landscape report on ransomware attacks published today by the European Union Agency for Cybersecurity (ENISA) uncovers the shortcomings of the current reporting mechanisms across the EU.
MEP Breakfast - How to secure Europe's cyber future
On 24 September 2019, ENISA organised a breakfast debate with Members of the European Parliament at the Bavarian Representation to the European Union in Brussels. The theme of the event was ‘How to Secure Europe’s Cyber Future?’.
Cybersecurity to the Rescue: Pseudonymisation for Personal Data Protection
ENISA’s new report explores pseudonymisation techniques and use cases for healthcare and information sharing in cybersecurity
Pagination