Search results

104 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Report/Study ENISA Threat Landscape 2020 - Physical manipulation/ damage/ theft/ loss
The report provides an overview of physical tampering, damage, theft and loss of devices and outlines security practices, trends and findings. It also lists proposed actions for mitigation
Located in Publications
2018 CTI-EU Event
Located in Events
File Supporting CSIRT capabilities and reduce manual operations
Located in Events / CTI-EU event / CTI-EU Event Presentations
Annual Cybersecurity Assessment 2017 of Estonian Information System Authority (RIA)
The Estonian Information System Authority (RIA) recently published the agency's 2017 cybersecurity report in English.
Located in News / News from the Member States
Getting ready for the next European Cyber Security Challenge
Located in News / ENISA News
Report/Study Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M communications. It also aims to support decision makers to comprehend the landscape and take informed decisions regarding cyber-security by incorporating consolidated information from the European Network & Information Security (NIS) threat landscape evolution.
Located in Publications
Report/Study Hardware Threat Landscape and Good Practice Guide
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in Publications
Report/Study ENISA Threat Landscape Report 2016
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime monetization”. Undoubtedly, optimization of cyber-crime turnover was THE trend observed in 2016.
Located in Publications
File Threat Taxonomy
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in Topics / / Threat Landscape / ENISA Threat Landscape through the years
ENISA Thematic Landscapes
Located in Topics / Threat and Risk Management / Threat Landscape

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information