Scroll through EU Cybersecurity Certification
The new mini-site launched by the European Union Agency for Cybersecurity (ENISA) serves the objective to promote and disseminate information related to EU cybersecurity certification.
Cyber Europe 2024: Unveiling key insights from the cyber exercise that tested the cybersecurity of EU’s energy sector
The after action report provides an overview of the 2024 edition of the Cyber Europe exercise which was conducted in June and aimed at identifying gaps and increasing cybersecurity preparedeness and resilience.
5G Security Controls Matrix
The ENISA 5G Security controls matrix is a comprehensive and dynamic matrix of security controls and best practices for 5G networks, to support the national authorities in the EU Member States with implementing the technical measures of the EU’s 5G…
Unveiling the Telecom Cybersecurity Challenges
The European Union Agency for Cybersecurity (ENISA) publishes one report on eSIMs and a second one on fog and edge computing in 5G. Both reports intend to provide insights on the challenges of these technologies.
Highlights of the Cybersecurity Standardisation Conference
The 2021 edition of the Conference presented the developments and upcoming challenges in European standardisation under the Cybersecurity Act.
Custom-made Awareness Raising to enhance Cybersecurity Culture
The European Union Agency for Cybersecurity (ENISA) empowers organisations by publishing the updated version of the ‘Awareness Raising in a Box’.
Roadmap on the cooperation between CSIRTS and LE
The purpose of this roadmap is to further explore the cooperation across computer security incident response teams (CSIRTs) in particular with national and governmental - law enforcement (LE) and the Judiciary (prosecutors and judges). This roadmap…
Cybersecurity Certification: breaking new ground
This year the European Union Agency for Cybersecurity (ENISA), has returned with its recurrent Cybersecurity Certification Conference.
Asking for your feedback: ENISA technical guidance for the cybersecurity measures of the NIS2 Implementing Act
We are inviting industry stakeholders to provide comments on the technical guidance for the NIS2 implementing act on cybersecurity measures for critical entities in the digital infrastructure sector.
Data Pseudonymisation: Advanced Techniques and Use Cases
This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple…
Pagination