Communication network dependencies for ICS/SCADA Systems
A good practice guide of using taxonomies in incident prevention and detection
Guidelines for SMEs on the security of personal data processing
Indispensable baseline security requirements for the procurement of secure ICT products and services
Distributed Ledger Technology & Cybersecurity - Improving information security in the financial sector
Cyber Security and Resilience of smart cars
Towards a Digital Single Market for NIS Products and Services
The objective of this report is to assess the current NIS market in the EU from an economic and technical standpoint, in view of the DSM and its future demands for protection. It primarily focuses on the European market’s characteristics,…
PETs controls matrix - A systematic approach for assessing online and mobile privacy tools
Following previous work in the field of privacy engineering, in 2016 ENISA defined the ‘PETs control matrix’, an assessment framework and tool for the systematic presentation and evaluation of online and mobile privacy tools for end users. The…
Security of Mobile Payments and Digital Wallets
Securing Smart Airports
In response to the new emerging threats faced by smart airports, this report provides a guide for airport decision makers (CISOs, CIOs, IT Directors and Head of Operations) and airport information security professionals, but also relevant…
Pagination