Search results

76 items matching your search terms.
Filter the results.
Item type
















































New items since



Sort by relevance · date (newest first) · alphabetically
1st Future Internet Summit Report
The Exceutive Director of ENISA chaired the keynote session at the Future Internet Summit in Luxembourg.
Located in News / ENISA News
1st joint Agency/Greek Ministry 'Cloud Computing' industry event
The first, joint event for industry on 'Cloud Computing in Europe', co-organised by ENISA and the Ministry of Infrastructure, Transport and Networks, took place in Athens, on 24th Nov. 2010.
Located in News / ENISA News
2nd Europol-ENISA IoT Security Conference
The 2nd Europol-ENISA IoT Security Conference focuses on the cybersecurity of the entire IoT ecosystem by providing a platform for all relevant stakeholders to exchange insights and discuss pertinent topics and open challenges.
Located in Events
3rd ENISA - Europol IoT Security Conference
The 3rd ENISA - Europol IoT Security Conference focuses on the cybersecurity of Internet of Things and emerging technologies such as Artificial Intelligence. It will provide a platform for all relevant stakeholders to exchange insights, discuss pertinent topics and challenges, and identify good practices, security measures and solutions.
Located in Events
“Cybersecurity in the age of the Internet of Things and Artificial Intelligence”: Breakfast debate organised by ENISA and MEP Albrecht
ENISA in cooperation with MEP Jan Philipp Albrecht organised a challenging breakfast discussion on cybersecurity issues.
Located in News / ENISA News
“Mastering the Power of Connectivity”: Udo Helmbrecht speaks about 5G infrastructure & connectivity at the Connected Citizens Summit 2017
ENISA's Executive Director, Udo Helmbrecht, participated in the Connected Citizens Summit, a “European beacon of innovation”, which took place on Wednesday 31st May 2017 in Berlin.
Located in News / Executive Director's news
File PDF document ‘lifelogging’ et de la publication de données personnelles en ligne
«Consigner ou ne pas consigner ?» L’agence de cyber-sécurité ENISA a établi un rapport sur le futur impact du ‘lifelogging’ et de la publication de données personnelles en ligne, examinant leurs répercussions sur la confidentialité, l’économie, la société et la psychologie des individus
Located in News / ENISA News / PR's in FR
File Octet Stream «Να συνδέεται κανείς ή να μη συνδέεται;» Έκθεση του οργανισμού ENISA για την κυβερνοασφάλεια σχετικά με τις μελλοντικές επιπτώσεις του «Life-Logging» και των ηλεκτρονικών δεδομένων προσωπικού χαρακτήρα, καθώς και τις επιπτώσεις στο απόρρητο, την οικονομία
Ο ENISA αποπειράται να προβλέψει τις θετικές και αρνητικές επιπτώσεις, για το 2014, του ηλεκτρονικού «life-logging» (η μεταφόρτωση δεδομένων προσωπικού και άλλου χαρακτήρα στο διαδίκτυο) για τους πολίτες και την κοινωνία. Σε μια νέα έκθεση, με τίτλο «Να συνδέεται κανείς ή να μη συνδέεται; Κίνδυνοι και οφέλη από τις αναδυόμενες τεχνολογίες ‘life-logging’», ο Οργανισμός χρησιμοποιεί την καθημερινή ζωή μιας υποθετικής οικογένειας για να εξετάσει τις επιπτώσεις για το απόρρητο, το «πορτοφόλι», την ψυχολογία της οικογένειας, κτλ., καθώς τα μέλη της μεταφορτώνουν όλο και περισσότερες προσωπικές πληροφορίες στο διαδίκτυο. Στην έκθεση περιλαμβάνονται συστάσεις σχετικά με την αντιμετώπιση των κινδύνων για την ασφάλεια και το απόρρητο.
Located in News / ENISA News / PRs in Greek
Report/Study Appstore security: 5 lines of defence against malware
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.
Located in Publications
Report/Study Architecture model of the transport sector in Smart Cities
The main objective of this study is to model the architecture of the transport sector in SCs and to describe good cyber security practices of IPT operators. The good practices are put into a relationship with different city maturity levels. This allows representatives of operators and municipalities to quickly assess whether or not they lag behind other cities with the same maturity level in terms of cyber security and, if so, to take appropriate actions. The study is primarily focused on the provision of practical, hands-on guidance.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information