Search results

85 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Ad hoc Working Group calls
On this page you can find all the ongoing calls for the expression of interest in the Ad-hoc Working Groups, supporting ENISA in the process of building knowledge on Artificial Intelligence Security.
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Call for Expression of Interest: Experts Group in Artificial Intelligence Cybersecurity
The EU Agency for Cybersecurity calls for experts in Artificial Intelligence Cybersecurity.
Located in News / ENISA News
File x-conference/x-cooltalk Data Protection Notice
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
File Terms of Reference - AI WG
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Image AI pic landing page
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Report/Study ENISA good practices for security of Smart Cars
This report defines good practices for security of smart cars, namely connected and (semi-) autonomous vehicles, providing added-value features in order to enhance car users’ experience and improve car safety. Taking stock of all existing standardization, legislative and policy initiatives, this report aims to serve as a reference point to promote cybersecurity for smart cars (connected and automated cars) across Europe and raise awareness on relevant threats and risks with a focus on “cybersecurity for safety”.
Located in Publications
Press Release Troff document ENISA puts Cybersecurity in the driver's seat
ENISA, the European Union Agency for Cybersecurity highlights the importance of cybersecurity for connected cars in a new report.
Located in News / ENISA News
Report/Study Good Practices for Security of IoT - Secure Software Development Lifecycle
This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.
Located in Publications
Press Release Troff document How to implement security by design for IoT
ENISA, the European Union Agency for Cybersecurity releases ‘Good Practices for Security of IoT’, a significant report to promote security by design for IoT.
Located in News / ENISA News
IoT
Validation workshop for Good practices for security of IoT
Located in Events

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information