Cloud Computing reports -now in Japanese
ENISA has received the support of the Japanese government’s Agency for the Promotion of Information Technology (IPA) for the dissemination of ENISA’s work on cloud computing in Japan. Thanks to the IPA’s initiative, the reports “Cloud computing:…
Cyber Insurance: A look at recent advances, good practices and challenges by ENISA
ENISA recognising the growing need of insurance companies and customers alike, developed a report, focusing on key developments, challenges, and an insurers’ pre-policy risk assessment.
Mobile malware attacks & the security of app-stores: Agency analysis
The Agency has made a brief analysis of a recent spate of malware attacks on smartphone platforms, and presents a new 'top-ten-risks' for smartphones list.
ENISA 2009-report on Cloud Computing-now available in Italian
One of the most popular ENISA reports has independently received the support for increased dissemination and thus impact of ENISA’s work on cloud computing, as the Cloud Security Alliance (CSA) Italy Chapter has, at its own initiative, translated…
Securing smart infrastructure during the COVID-19 pandemic
Securing smart homes and smart buildings from cybersecurity risks becomes more relevant than ever in the light of the COVID-19 pandemic crisis. ENISA presents some fundamental measures for securing smart devices.
OTT Security & Resilience: ENISA Launches a New Survey
Survey to identify the risks, mitigation measures and COVID-19 factors affecting Over-The-Top communications and collaboration services across the EU.
Instantly online-17 golden rules for mobile social networks
Instantly online-17 golden rules to combat online risks and for safer surfing mobile social networks
The EU ‘cyber security’ Agency - ENISA (the European Network and Information Security Agency) today presents a new report on accessing social…
EU cyber security Agency ENISA calls for secure e-banking and e-payments: non-replicable, single-use credentials for e-identities are needed in the financial sector
Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of inadequate authentication mechanisms according to a new study by the EU…
Watch our cloud computing video clip
How can businesses and governments get the obvious benefits of
cloud computing without putting their organisation at risk? Watch our video clip online.
Estonia - Cyber Security Strategy 2014 - 2017 now available
In September 2014, the Estonian Government approved the Cyber Security Strategy for 2014–2017 with the objective of increasing the capacity of the state in the area of cyber security and raising the awareness of the population of cyber risks.
Pagination