Search results

85 items matching your search terms.
Filter the results.
Item type


















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study text/texmacs Securing Smart Airports
In response to the new emerging threats faced by smart airports, this report provides a guide for airport decision makers (CISOs, CIOs, IT Directors and Head of Operations) and airport information security professionals, but also relevant national authorities and agencies that are in charge of cyber-security for airports. Based on an in depth examination of existing knowledge as well as validation interviews with subject matter experts, this report highlights the key assets of smart airports. Built on this, a detailed analysis and threats mapping was conducted with a particular focus on the vulnerabilities of smart components.
Located in Publications
Securing Smart Cars – Join ENISA study and workshop
ENISA is currently performing a study on cyber security measures for smart cars and earlier this year launched the ENISA CaRSEC (Cars and Roads SECurity) expert group.
Located in News / ENISA News
Press Release Securing smart cars today; for safer autonomous cars tomorrow
ENISA publishes a study on the "Cyber security and resilience of smart cars". The report identifies good practices and recommendations to ensure the security of smart cars against cyber threats.
Located in News / ENISA News
File Troff document Securing the IoT
Located in News / ENISA News
File Security and Liability in the Internet of Things
Speech by ENISA’s Executive Director, Prof. Dr. Udo Helmbrecht at the Greens/EFA Group Hearing, 7th June, European Parliament, Brussels.
Located in Publications / ED's speeches
Report/Study ECMAScript program Security and Resilience of Smart Home Environments
This study aims at securing Smart Home Environments from cyber threats by highlighting good practices that apply to every step of a product lifecycle: its development, its integration in Smart Home Environments, and its usage and maintenance until end-of-life. The study also highlights the applicability of the security measures to different types of devices. The good practices apply to manufacturers, vendors, solution providers for hardware and software, and developers. It can be used to assess their current security level, and evaluate the implementation of new security measures. European citizens, standardisation bodies, researchers and policy makers could also find an interest in this study.
Located in Publications
File chemical/x-pdb Security Challenges and best practices in the IoT Environment
Speech by ENISA’s Executive Director, Prof. Dr. Udo Helmbrecht at the Public Hearing on Security Challenges and best practices in the IoT Environment European Parliament, 7th November 2017. Hosted by Dita Charanzova MEP
Located in Publications / ED's speeches
Report/Study ECMAScript program Smartphone Secure Development Guidelines
This document was produced jointly with the OWASP mobile security project. It is also published as an ENISA deliverable in accordance with our work programme 2011. It is written for developers of smartphone apps as a guide to developing secure apps. It may however also be of interest to project managers of smartphone development projects.
Located in Publications
Report/Study Smartphone Secure Development Guidelines
This document is an updated version of the Smartphone Development Guidelines published by ENISA in 2011. New developments in both software and hardware have been translated into new significant threats for the mobile computing environment, highlighting the need for an update of the document.
Located in Publications
File Terms of Reference - AI WG
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information