A Good Practice Collection for CERTs on the Directive on attacks against information systems
This Good Practice Collection was produced at the initiative of ENISA in the context of its support activities to ensure the efficient functioning of CSIRTs and their cooperation with Law Enforcement Agencies (LEAs) in the face of a new development…
Cloud Cybersecurity Market Analysis
The present European Union Agency for Cybersecurity (ENISA) report is an analysis of the cloud cybersecurity market, planned for in ENISA’s Work Programme 2022 ( ) under activity O.7.1., ‘Market analysis on the main trends in the cybersecurity…
Annual Incident Reports 2015
For the fifth year, ENISA publishes the annual report about significant outage incidents in the European electronic communications sector, which are reported to ENISA and the European Commission (EC) under Article 13a of the Framework Directive (…
Cybersecurity Policy Challenges on the Agenda of the European Parliament Delegation Visit to ENISA
The European Union Agency for Cybersecurity (ENISA) welcomed the visit of Members of the European Parliament’s committee on Industry, Research and Energy (ITRE) to discuss current cybersecurity challenges and latest policy developments.
Joint Statement on Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities
Assessment and advice on recovery and mitigating actions.
Security and Resilience of Smart Home Environments
This study aims at securing Smart Home Environments from cyber threats by highlighting good practices that apply to every step of a product lifecycle: its development, its integration in Smart Home Environments, and its usage and maintenance until…
Auditing Framework for TSPs
This report provides an overview of the dedicated means of auditing for TSPs. It discusses specifically the following areas: standards applicable to TSPs and Conformity Assessment Bodies (auditors), methodology of auditing TSPs (off- and on-site),…
Report on Second International Conference on Cyber-crisis Cooperation and Exercises
ENISA hosted the ‘Second ENISA International Conference on Cyber Crisis Cooperation and Exercises’ on 23–24 September 2013 in Athens, Greece.
The Second ENISA International Conference on Cyber-Crisis Cooperation and Exercises was a unique high-…
Leon conclusions: ENISA to bridge gap between technology & policy
Leon conference conclusions: ENISA to bridge the gap between technology and policy
NFV Security in 5G - Challenges and Best Practices
In this report explores relevant challenges, vulnerabilities and attacks to the Network Function Virtualization (NFV) within the 5G network. NFV changes the network security environment due to resource pools based on cloud computing and open network…
Pagination