The 2025 ENISA Threat Landscape shows that threat groups are reusing tools and techniques, introducing new attack models, exploiting vulnerabilities and collaborating to target the security and resilience of the EU’s digital infrastructure.
Understanding the increase in Supply Chain Security Attacks
eHealth security in the spotlight: A good practice guide for a robust and resilient EU health sector
Unveiled on the sidelines of the 10th edition of the eHealth Security conference, the European Union Agency for Cybersecurity (ENISA) publishes a good practice guide to support entities of the health sector in strengthening their digital security…
New report on Supply Chain Integrity launched
Supply chain integrity (SCI) in the ICT industry is a topic that is receiving attention from both the public and private sectors (i.e. vendors, infrastructure owners, operators, etc.) as part of a wider review of supply chain control, and the…
IoT Security: ENISA Publishes Guidelines on Securing the IoT Supply Chain
Supporting NIS2 implementation through actionable guidance
The EU Agency for Cybersecurity (ENISA) publishes a technical guideline for the security measures of the NIS2 Implementing Regulation to assist digital infrastructures and managed service providers.
7th Cybersecurity Forum: Power grids cybersecurity ascending to prominence
The Association of European Distribution System Operators (E.DSO), the European Energy Information Sharing and Analysis Centre (EE-ISAC), the European Network for Cyber Security (ENCS) and the European Union Agency for Cybersecurity (ENISA)…
EU’s first ever report on the state of cybersecurity in the Union
In accordance with Article 18 of the NIS 2 Directive, ENISA was tasked to prepare a biennial report on the state of cybersecurity in the Union.
From Cyber to Outer Space: A Guide to Securing Commercial Satellite Operations
The European Union Agency for Cybersecurity (ENISA) explores the cybersecurity threat landscape of space to strengthen the resilience of commercial satellites.
Navigating through Challenges and Opportunities of Cybersecurity Standardisation
Pagination