United Kingdom - 2015 information security breaches survey is published
The UK's Digital Economy Minister, Mr. Ed Vaizey, has launched the 2015 Information Security Breaches Survey at the Infosecurity Europe event last week.
Kroes: European Internet Security Strategy due for Q3/2012
Commissioner Kroes has announced that the European Internet Security Strategy is planned for autumn 2012.
New 'Who-is-Who' in Network & Information Security, 2011 Edition
The Agency has released its new, 6th edition of the 'Who-is-Who' in Network and Information Security.
Cybersecurity for 5G: ENISA Releases Report on Security Controls in 3GPP
The European Union Agency for Cybersecurity (ENISA) provides authorities with technical guidance on the 5G Toolbox measure for security requirements in existing 5G standards.
The Netherlands - New Director at National Cyber Security Centre (NCSC)
On 1st November, Hans de Vries (50) will take up his new role as head of the National Cyber Security Centre (NCSC) in the Netherlands.
How to Secure the Connected & Automated Mobility (CAM) Ecosystem
The European Union Agency for Cybersecurity discloses an in-depth analysis of the cybersecurity challenges faced by the CAM sector and provides actionable recommendations to mitigate them.
Position Paper: security risks, online banking and eID cards
ENISA launches new Position Paper on security risks in online banking through European eID cards
In-depth interview re: the 2012 cyber security incidents report
In-depth interview with Christoffer Karsberg regarding the 2012 cyber security incidents report.
New Report: Incentives & challenges for cyber security information sharing
The EU ‘cyber security’ Agency ENISA, i.e. the European Network and Information Security Agency, launched a new report on barriers to and incentives for cyber security information sharing. The report shows e.g. that the economic incentives are much…
ENISA produces guidelines for assessing security measures in the context of net neutrality
In the world of the internet, security is a fast moving field and cyber-attacks are changing constantly. What may have been an appropriate security measure at one point in time may be considered unnecessary and disproportionate later on.
Pagination