Being diabetic in 2011
Identifying emerging and future risks in remote health monitoring and treatment
Good practices on the implementation of regulatory technical standards
MS approaches on PSD 2 implementation: commonalities in risk management and incident reporting - The main objective of this study is to identify the differences introduced by Member States in the implementation of the PSD2. In particular, the aim is…
DNS Identity
This report provides a view of authentication and verification of domain name owners in the context of domain name registration. It identifies the security challenges, good practices, security controls and associated risks in the domain name…
Cloud Security Guide for SMEs
This guide wants to assist SMEs understand the security risks and opportunities they should take into account when procuring cloud services. This document includes a set of security risk, a set of security opportunities and a list of security…
Trust and Reputation Models
Reputation systems are a key success factor of many websites, enabling users and customers to have a better understanding of the information, products and services being provided. However, by using reputation systems, individuals place themselves at…
Foresight Cybersecurity Threats For 2030 - Update 2024
This booklet summarises upcoming challenges and provides for an assessment of the risks. We are now ready to design the cyber secure future ahead of us.
Cloud Computing Information Assurance Framework
One of the most important recommendations in the ENISA’s Cloud Computing Risk Assessment report is the Information Assurance Framework, a set of assurance criteria designed to assess the risk of adopting cloud services, compare different Cloud…
Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
Remote ID Proofing - Good practices
Through this report, ENISA aims to enhance stakeholder awareness, facilitate risk analysis in evolving threat landscapes, and bolster trustworthiness in remote identity proofing methods.
Cyber Insurance - Models and methods and the use of AI
The main objective of this report is to introduce cyber risk and cyber insurance, provide an overview of existing research and modelling approaches, and identify gaps for upcoming research projects.
Pagination