Search results

92 items matching your search terms.
Filter the results.
Item type

























































New items since



Sort by relevance · date (newest first) · alphabetically
File Troff document Securing the IoT
Located in News / ENISA News
File Security and Liability in the Internet of Things
Speech by ENISA’s Executive Director, Prof. Dr. Udo Helmbrecht at the Greens/EFA Group Hearing, 7th June, European Parliament, Brussels.
Located in Publications / ED's speeches
Report/Study ECMAScript program Security and Resilience of Smart Home Environments
This study aims at securing Smart Home Environments from cyber threats by highlighting good practices that apply to every step of a product lifecycle: its development, its integration in Smart Home Environments, and its usage and maintenance until end-of-life. The study also highlights the applicability of the security measures to different types of devices. The good practices apply to manufacturers, vendors, solution providers for hardware and software, and developers. It can be used to assess their current security level, and evaluate the implementation of new security measures. European citizens, standardisation bodies, researchers and policy makers could also find an interest in this study.
Located in Publications
File chemical/x-pdb Security Challenges and best practices in the IoT Environment
Speech by ENISA’s Executive Director, Prof. Dr. Udo Helmbrecht at the Public Hearing on Security Challenges and best practices in the IoT Environment European Parliament, 7th November 2017. Hosted by Dita Charanzova MEP
Located in Publications / ED's speeches
Report/Study ECMAScript program Smartphone Secure Development Guidelines
This document was produced jointly with the OWASP mobile security project. It is also published as an ENISA deliverable in accordance with our work programme 2011. It is written for developers of smartphone apps as a guide to developing secure apps. It may however also be of interest to project managers of smartphone development projects.
Located in Publications
Report/Study Smartphone Secure Development Guidelines
This document is an updated version of the Smartphone Development Guidelines published by ENISA in 2011. New developments in both software and hardware have been translated into new significant threats for the mobile computing environment, highlighting the need for an update of the document.
Located in Publications
File Terms of Reference - AI WG
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Press Release The Internet of Things: when your washing machine and blood pressure monitor become a target for cyberattacks
Europol-ENISA conference tackles security challenges of IoT
Located in News / ENISA News
Report/Study Troff document Towards secure convergence of Cloud and IoT
The aim of this work is to provide a high-level overview on the security issues to IoT developers and IoT integrators that make use of IoT Cloud Computing and Cloud service Providers (CSPs) of IoT Cloud offerings.
Located in Publications
Towards secure convergence of Cloud and IoT
ENISA publishes today a short paper aiming to identify and tackle the security challenges that the IoT ecosystem brings to Cloud and vice-versa.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information