Search results

103 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
ENISA Workshop on EU Threat Landscape
ENISA is organising the EU Threat Landscape Workshop on the 24th February, 2015, in Brussels. The workshop is targeted at vendors, policy and decision makers, NIS security experts involved in threat intelligence, security operation centres and risk assessments, and other public and private sector organisations who use threat intelligence in cyber security defence
Located in Events
ENISA Workshop on EU Threat Landscape
Located in Events
ENISA Workshop on EU Threat Landscape - Registration now open
Online registration for the first ENISA Workshop on EU Threat Landscape is now open. The workshop will take place in Brussels on 24th February 2015.
Located in News / ENISA News
Press Release ENISA’s Cyber-Threat overview 2015
ENISA Threat Landscape 2015: A consolidated overview to the 15 top cyber threats together with detailed threat assessments in the emerging areas Software Defined Networks and Big Data.
Located in News / ENISA News
Press Release ENISA’s Executive Director Udo Helmbrecht emphasises on cybersecurity enabled values for EU growth and highlights the challenges in IoT and data security
Located in News / ENISA News
Press Release ENISA’s ten messages to industry at Berlin IT security forum
Located in News / ENISA News
ENISA’s Udo Helmbrecht at EPP Hearing on cybersecurity
Located in News / ENISA News
Image ETL Structure
Located in Topics / Threat and Risk Management / Threat Landscape
Getting ready for the next European Cyber Security Challenge
Located in News / ENISA News
Report/Study Hardware Threat Landscape and Good Practice Guide
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information