Security Issues in Cross-border e-Authentication
The Agency has launched a new report on Security Issues in Cross-border Electronic Authentication.
Improving the interoperability of electronic identification and authentication systems is a European task
and a task for all Member States. ENISA…
Good practices for identifying and assessing cybersecurity interdependencies
A glance at the interdependency landscape reveals several emerging interdependencies between operators of essential services (OES) and digital service providers (DSP), at both system and service level. Due to these interdependencies, there is an…
Report on the EU 5G Toolbox Implementation by Member States Published
Today, the European Commission and the German Presidency of the Council of the EU released the report on the progress made by the EU27 in implementing the EU 5G toolbox measures and strengthening safety measures. The European Union Agency for…
Flying 2.0? Study of Internet of Things/RFID in air travel launched
Flying 2.0? ENISA launches study on future challenges of Internet of Things/RFID in air travel
Hackers-for-Hire drive the Evolution of the New ENISA Threat Landscape
The 9th edition of the ENISA Threat Landscape (ETL) report released by the European Union Agency for Cybersecurity highlights the surge in cybercriminality motivated by monetisation using ransomware or cryptojacking.
Agency Position on the Industry Proposal re: a Privacy Impact Assessment for RFID
Agency Position on the Industry Proposal re: a Privacy and Data Protection Impact Assessment Framework for RFID Applications
Quantum Key Distribution 'Briefing' paper
ENISA 'Briefing’ paper on Quantum Key Distribution.
Safe printing: a forgotten link
Printing – the ‘forgotten’ security link to safeguard business assets. EU Agency ENISA launches report on ‘Secure Printing’
ENISA, the EU Agency for European Network and Information Security, launches its report on “Secure Printing’ with…
Germany - News on cloud computing
BSI publications address cloud service providers and cloud service users (power user as well as citizens).
Behavioural aspects of cybersecurity
Technical cybersecurity measures do not exist in a vacuum and need to operate in harmony with people. Against this backdrop, ENISA publishes a report comprising four evidence-based reviews of human aspects of cybersecurity: two based on the use…
Pagination