Search results

107 items matching your search terms.
Filter the results.
Item type






































New items since



Sort by relevance · date (newest first) · alphabetically
ENISA Workshop on EU Threat Landscape
ENISA is organising the EU Threat Landscape Workshop on the 24th February, 2015, in Brussels. The workshop is targeted at vendors, policy and decision makers, NIS security experts involved in threat intelligence, security operation centres and risk assessments, and other public and private sector organisations who use threat intelligence in cyber security defence
Located in Events
Report/Study ENISA Threat Landscape 2015
This report, the ENISA Threat Landscape 2015 (ETL 2015), is the result of an analysis of cyber-threats that have been encountered in the last 12 months, that is, approximately between December 2014 and December 2015. ETL 2015 is the fourth in a series of reports issued yearly by ENISA. It provides an analysis of the state and the dynamics of the cyber-threat environment: the Cyber-Threat Landscape.
Located in Publications
Report/Study ENISA Threat Landscape 2014
In the ETL 2014, details of the developments made in 2014 are consolidated by means of top cyber threats and emerging threat trends in various technological and application areas. References to over 400 relevant sources on threats will help decision makers, security experts and interested individuals to navigate through the threat landscape.
Located in Publications
Report/Study ENISA Threat Landscape mid year 2013
ENISA presents in this short paper a first “taste” of current developments related to the Threat Landscape 2013.
Located in Publications
Report/Study text/texmacs ENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats
ENISA releases the 2013's ENISA Threat Landscape (ETL 2013). The ENISA Threat Landscape is a collection of top cyber-threats that have been assessed in the reporting period, ie. end 2012-end 2013. ENISA has collected over 250 reports regarding cyber-threats, risks and threat agents. ETL 2013 is a comprehensive compilation of the top 15 cyber-threats assessed.
Located in Publications
Report/Study ENISA Threat Landscape 2012
The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent reports from security industry, networks of excellence, standardisation bodies and other independent institutes have been analysed.
Located in Publications
Report/Study Threat Landscape of Internet Infrastructure
This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources (administrators and operators) for Routing, DNS and Denial of Service, as well as System Configuration and Essential Addressing Protocols for Denial of Service.
Located in Publications
Report/Study Threat Landscape for Smart Home and Media Convergence
The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic effects on broader information security.
Located in Publications
Report/Study Smart Grid Threat Landscape and Good Practice Guide
ENISA report on threats in the area of smart grids and good practice guide.
Located in Publications
Report/Study ECMAScript program Consumerization of IT: Top Risks and Opportunities
This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent trend where user-owned consumer oriented hard- and software spreads in business environments. COIT is considered as a term embracing the recent trend known as Bring-Your-Own-Device (BYOD).
Located in Publications

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more