-
ENISA Threat Landscape 2020 - Physical manipulation/ damage/ theft/ loss
-
The report provides an overview of physical tampering, damage, theft and loss of devices and outlines security practices, trends and findings. It also lists proposed actions for mitigation
Located in
Publications
-
2018 CTI-EU Event
-
Located in
Events
-
Supporting CSIRT capabilities and reduce manual operations
-
Located in
Events
/
CTI-EU event
/
CTI-EU Event Presentations
-
Annual Cybersecurity Assessment 2017 of Estonian Information System Authority (RIA)
-
The Estonian Information System Authority (RIA) recently published the agency's 2017 cybersecurity report in English.
Located in
News
/
News from the Member States
-
Getting ready for the next European Cyber Security Challenge
-
Located in
News
/
ENISA News
-
Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
-
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M communications. It also aims to support decision makers to comprehend the landscape and take informed decisions regarding cyber-security by incorporating consolidated information from the European Network & Information Security (NIS) threat landscape evolution.
Located in
Publications
-
Hardware Threat Landscape and Good Practice Guide
-
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in
Publications
-
ENISA Threat Landscape Report 2016
-
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime monetization”. Undoubtedly, optimization of cyber-crime turnover was THE trend observed in 2016.
Located in
Publications
-
Threat Taxonomy
-
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in
Topics
/
…
/
Threat Landscape
/
ENISA Threat Landscape through the years
-
ENISA Thematic Landscapes
-
Located in
Topics
/
Threat and Risk Management
/
Threat Landscape