Top three recommendations for securing your personal data using cryptography, by EU cyber security Agency ENISA in new report
ENISA, the European Union’s “cyber security” Agency, launched today a report recommending that all authorities should better promote cryptographic measure to safeguard personal data.
Technical guideline for Incident Reporting
This document describes a framework for security incident reporting based on the requirements set by article 19 of the eIDAS regulation. It is being developed on a consensus basis between the experts of the working group formed by ENISA and it is…
Technical Guidelines for the implementation of minimum security measures for Digital Service Providers
ENISA has issued this report to assist Member States and DSPs in providing a common approach regarding the security measures for DSPs. This particular initiative has been achieved by examining current information and network security practices for…
ENISA releases online NIS Directive tool showing per sector the national authorities for operators of essential services and digital service providers
Today ENISA releases an interactive tool showing the relevant national laws and regulations, and per sector and subsector the national authorities supervising the NIS Directive.
Power Supply Dependencies in the Electronic Communications Sector
Electronic communications are the backbone of the EU’s digital society. Article 13a of the EU’s electronic communications Framework directive asks EU Member States to ensure the security and resilience of public electronic communications networks…
“Experience is a good school. But the fees are high”. ENISA urges decision makers to take action before a major cyber crisis occurs in Europe
ENISA analysed the EU-level crisis management frameworks in five different sectors to make recommendations on more efficient cyber crisis cooperation and management.
ENISA Telecom Security Forum
On the 29th of June, 09:30 -17:30 CET, ENISA organizes the 2nd Telecom Security Forum in Brussels, Thon Hotel EU.
Deploying Pseudonymisation Techniques
Pseudonymisation is increasingly becoming a key security technique for providing a means that can facilitate personal data processing, while offering strong safeguards for the protection of personal data and thereby safeguarding the rights and…
Pagination