Search results

230 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Located in Press & Media / News Items
File SIS package DuQu analysis
Located in Press & Media / News Items
Procurement Cloud Computing Smart Grids and Interconnected Networks - (3 Lots)
Located in Public Procurement
Report/Study The cost of incidents affecting CIIs
The aim of the study is to assess the economic impact of incidents that affect CIIs in EU, based on existing work done by different parties, and set the proper ground for the future work of ENISA in this area.
Located in Publications
Call for Expression of Interest – CAMSec Experts Group
The EU Agency for Cybersecurity calls for Experts to join the ENISA Connected and Automated Mobility Security Experts Group
Located in News / ENISA News
File PDF document NL NCSS2
Located in Topics / National Cybersecurity Strategies / National Cybersecurity Strategies (NCSSs) Map
File Octet Stream Agenda
Located in Events / 1st International Conference (Paris, 2012)
Press Release Octet Stream New report: App-store security– the 'five lines of defence'
The Agency today publishes a new report on app-store security where it advocates for a baseline set of ‘five lines of defence ‘ against malware.
Located in News / ENISA News
Press Release PowerPoint presentation New Guide launched re: building effective IT Security Public Private Partnerships (PPPs)
A new Guide with 36 recommendations on building effective Public and Private Partnerships for resilient IT security has been launched.
Located in News / ENISA News
Press Release D source code Clarifying cyber security incident reporting: guidelines on how to implement the new telecom legislation on security & integrity “Art 13a”.
ENISA, the EU’s ‘cyber security’ agency, has today issued two technical guidelines. The first describes how to implement the mandatory cyber security incident reporting scheme for telecom operators, parameters and thresholds, and how to report; the second describes specific security measures telecom operators should take.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information