Foreign Information Manipulation Interference (FIMI) and Cybersecurity - Threat Landscape
The EU Agency for Cybersecurity (ENISA) and the European External Action Service (EEAS) have joined forces to study and analyse the threat landscape concerning Foreign Information Manipulation and Interference (FIMI) and disinformation. A dedicated…
ENISA conference - Threathunt 2030
2024 edition of the Threathunt 2030 conference, the ENISA flagship conference focused on the emerging cybersecurity threats of the future and on how the Union and Member States can best foresee, identify, prevent and respond to future challenges…
Cyber security: future challenges and opportunities
New technologies and business models for the use of information and communications technologies (ICTs) have brought many benefits to the European Digital Society and the European citizens. At the same time, the increased use of ICTs has been…
Cyber Security and Resilience of smart cars
The objective of this study is to identify good practices that ensure the security of smart cars against cyber threats, with the particularity that smart cars’ security shall also guarantee safety. The study lists the sensitive assets present in…
Transport
The NIS2 directive highlights the importance of bolstering cybersecurity in the transport sector to protect critical infrastructure across aviation, maritime, rail, and road transport.
Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
European Cyber Security Month - Deployment report
ECSM is an EU advocacy campaign that promotes cyber security among citizens and advocates for change in the perception of cyber-threats by promoting data and information security, education, sharing of good practices and competitions.
The objective…
2024 ENISA CTI Conference
Save the date for ENISA's CTI conference 2024!
Foresight Cybersecurity Threats For 2030 - Update 2024
This booklet summarises upcoming challenges and provides for an assessment of the risks. We are now ready to design the cyber secure future ahead of us.
Pagination