-
2018 CTI-EU Event
-
Located in
Events
-
Supporting CSIRT capabilities and reduce manual operations
-
Located in
Events
/
CTI-EU event
/
CTI-EU Event Presentations
-
Annual Cybersecurity Assessment 2017 of Estonian Information System Authority (RIA)
-
The Estonian Information System Authority (RIA) recently published the agency's 2017 cybersecurity report in English.
Located in
News
/
News from the Member States
-
Getting ready for the next European Cyber Security Challenge
-
Located in
News
/
ENISA News
-
Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
-
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M communications. It also aims to support decision makers to comprehend the landscape and take informed decisions regarding cyber-security by incorporating consolidated information from the European Network & Information Security (NIS) threat landscape evolution.
Located in
Publications
-
Hardware Threat Landscape and Good Practice Guide
-
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in
Publications
-
ENISA Threat Landscape Report 2016
-
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime monetization”. Undoubtedly, optimization of cyber-crime turnover was THE trend observed in 2016.
Located in
Publications
-
Threat Taxonomy
-
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in
Topics
/
…
/
Threat Landscape
/
ENISA Threat Landscape
-
ENISA Threat Taxonomy - A tool for structuring threat information
-
Located in
Topics
/
…
/
ENISA Threat Landscape
/
ENISA Threat Landscape 2015
-
ENISA threat landscape - Top 15 Cyber Threats 2015
-
Located in
Topics
/
…
/
ENISA Threat Landscape
/
ENISA Threat Landscape 2015