The European Union Agency for Cybersecurity (ENISA) and the European Commission announce the request to ENISA to support the certification of the EU Digital Identity Wallets (EUDI).
Cybersecurity Certification Framework
The Goal of Cybersecurity Certification under the Cybersecurity Act
Security guidelines on the appropriate use of qualified electronic seals
This document addresses qualified electronic seals and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery and website authentication certificates to…
Security guidelines on the appropriate use of qualified electronic signatures
This document addresses qualified electronic signatures and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates…
CSIRT Capabilities. How to assess maturity? Guidelines for national and governmental CSIRTs
This report focuses on the maturity of national and governmental Computer Security and Incident Response Teams (CSIRTs) and the Trusted Introducer1 certification scheme for CSIRTs as an indicator of the maturity level of teams. The issues covered…
QWACs Plugin
Proof of concept browser plugin to support the two-step verification of qualified certificates for web-site authentication
Advancing Software Security in the EU
This study discusses some key elements of software security and provides a concise overview of the most relevant existing approaches and standards while identifying shortcomings associated with the secure software development landscape, related to…
Share your feedback: ENISA public consultation bolsters EU5G Cybersecurity Certification
ENISA has released and is seeking feedback on the embedded Universal Integrated Circuit Card (eUICC) specifications to support certification of 5G, which is carried out under the European Common Criteria scheme (EUCC).
Encrypted Traffic Analysis
This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of…
Pagination