ENISA Threat Landscape 2015: A consolidated overview to the 15 top cyber threats together with detailed threat assessments in the emerging areas Software Defined Networks and Big Data.
How critical is a critical information infrastructure?
ENISA issues methodologies for the identification of Critical Information Infrastructure (CII) services in communication networks.
ENISA at CeBIT: Supporting industry in the new EU legal framework on cybersecurity
ENISA’s Executive Director delivered the keynote speech on "European and national rules and regulations in the field of cyber security' today 14th March at CEBIT.
First EU Cyber Security Exercise 'Cyber Europe 2010’ with >320 ‘incidents’ successfully concluded
The first ever, pan-European cyber security exercise “Cyber Europe 2010” ended successfully yesterday. More than 150 experts from 70 public bodies around Europe participated in the exercise. They were exposed to more than 320 incidents, or ‘…
Key security actors, strategies, & good practices in Europe mapped
The EU Agency, ENISA, (the European Network and Information Security Agency) launches comprehensive study: European countries are highly varied in how prepared they are for dealing with the cybercrime, attacks and network resilience. This is a key…
Successful collaborative cyber security awareness raising - Large Scale Pilot for EU SME business & citizens;two new reports launched by EU Agency ENISA on the European Information Sharing and Alert System (EISAS)
The EU’s cyber security Agency ENISA has run a Large Scale Pilot project for the European Information Sharing and Alerting System – EISAS to better prepare EU business and citizens facing cyber threats. The EISAS Large Scale Pilot Report, details…
Position Paper: security risks, online banking and eID cards
ENISA launches new Position Paper on security risks in online banking through European eID cards
Solving the Cryptography Riddle: Post-quantum Computing & Crypto-assets Blockchain Puzzles
The European Union Agency for Cybersecurity releases two reports on cryptography: one on the progress of post-quantum cryptography standardisation, and the other on exploring the technologies under the hood of crypto-assets.
Pagination