Search results

103 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
Press Release ENISA’s ten messages to industry at Berlin IT security forum
Located in News / ENISA News
Press Release ENISA’s Cyber-Threat overview 2015
ENISA Threat Landscape 2015: A consolidated overview to the 15 top cyber threats together with detailed threat assessments in the emerging areas Software Defined Networks and Big Data.
Located in News / ENISA News
File Supporting CSIRT capabilities and reduce manual operations
Located in Events / CTI-EU event / CTI-EU Event Presentations
Report/Study Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M communications. It also aims to support decision makers to comprehend the landscape and take informed decisions regarding cyber-security by incorporating consolidated information from the European Network & Information Security (NIS) threat landscape evolution.
Located in Publications
File Threat Taxonomy
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in Topics / / Threat Landscape / ENISA Threat Landscape
Report/Study Hardware Threat Landscape and Good Practice Guide
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in Publications
2018 CTI-EU Event
Located in Events
ENISA Threat Landscape mid-year report - interview with author Louis Marinos
In-depth interview with Dr. Louis Marinos regarding the 2013 Threat Landscape mid-year report.
Located in News / ENISA News
Udo Helmbrecht discusses cyber cooperation at New York Summit
Located in News / ENISA News
ENISA’s Udo Helmbrecht at EPP Hearing on cybersecurity
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information