How to prevent machine learning cyberattacks? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning in a new report published today.
2024 ENISA CTI Conference
Save the date for ENISA's CTI conference 2024!
ENISA working group on Artificial Intelligence cybersecurity kick-off
Today, the European Union Agency for Cybersecurity, ENISA, is kicking off the Ad-Hoc Working Group on Cybersecurity for Artificial Intelligence, marking another milestone in the Agency’s work on emerging technologies.
Call for Expression of Interest: Experts Group in Artificial Intelligence Cybersecurity
The EU Agency for Cybersecurity calls for experts in Artificial Intelligence Cybersecurity.
9th ENISA eHealth Security Conference
The EU Agency for Cybersecurity (ENISA) is organising the 9th eHealth Security Conference, in collaboration with the Hungarian Cybersecurity Centre. The conference will be a full-day physical event, hosted by Semmelweis University in Budapest, on…
Artificial Intelligence: an opportunity for cyber-crisis management in the EU
On 3 and 4 June 2019, the EU Agency for Cybersecurity, ENISA organised a conference in Athens, which focused on the future of the EU cyber-crisis management. The advantages and challenges were identified, particularly where the use of artificial…
Cybersecurity Expert
ENISA-TA-AD-2021-05
Navigating cybersecurity investments in the time of NIS 2
The latest report of the European Union Agency for Cybersecurity (ENISA) aims to support policy makers in assessing the impact of the current EU cybersecurity framework, and particularly the NIS 2 Directive, on cybersecurity investments and the…
EU’s first ever report on the state of cybersecurity in the Union
In accordance with Article 18 of the NIS 2 Directive, ENISA was tasked to prepare a biennial report on the state of cybersecurity in the Union.
Encrypted Traffic Analysis: Use Cases & Security Challenges
The EU Agency for Cybersecurity explores encrypted traffic analysis’ use cases and identifies security challenges & opportunities
Pagination