Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
ECSC 2018 Analysis Report
The 5th Edition of the European Cyber Security Challenge, ECSC2018 was hosted in London during 14th to 17th October. The event was organised by the Cyber Security Challenge UK at the Tobacco Dock, an iconic grade one listed building which has a rich…
Cloud Computing Risk Assessment
ENISA, supported by a group of subject matter expert comprising representatives from Industries, Academia and Governmental Organizations, has conducted, in the context of the Emerging and Future Risk Framework project, an risks assessment on cloud…
Standards and tools for exchange and processing of actionable information
This document has been created as part of an ENISA-funded study of the state of security information sharing and is intended to supplement the main report, “Actionable Information for Security Incident Response.” The purpose of this document is to…
Fog and Edge Computing in 5G
This report focuses on the fundamentals of fog and edge, an overview of their security aspects, the open challenges that these sectors face, the related standardisation efforts, the existing opportunities in this field, and different application…
Cyber Europe 2012 - Key Findings Report
Cyber Europe was the biggest pan-European cyber security exercise to date. This report gives the key findings from ENISA.
Report on Second International Conference on Cyber-crisis Cooperation and Exercises
ENISA hosted the ‘Second ENISA International Conference on Cyber Crisis Cooperation and Exercises’ on 23–24 September 2013 in Athens, Greece.
The Second ENISA International Conference on Cyber-Crisis Cooperation and Exercises was a unique high-…
EU Cyber Cooperation-The Digital Frontline
We all share a common interest in guaranteeing a free, safe and sound life in cyberspace. ENISA
firmly believes EU cyber cooperation is crucial to establishing a proficient and coherent approach
to Network and Information Security (NIS). This…
Information Packages for Small and Medium Sized Enterprises (SMEs)
Information packages for 2-3 types of organisations to help them in selecting and applying a suitable method for performing and managing information security related risks.
Architecture model of the transport sector in Smart Cities
The main objective of this study is to model the architecture of the transport sector in SCs and to describe good cyber security practices of IPT operators. The good practices are put into a relationship with different city maturity levels. This…
Pagination