Search results

103 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
2018 CTI-EU Event
Located in Events
File Supporting CSIRT capabilities and reduce manual operations
Located in Events / CTI-EU event / CTI-EU Event Presentations
Annual Cybersecurity Assessment 2017 of Estonian Information System Authority (RIA)
The Estonian Information System Authority (RIA) recently published the agency's 2017 cybersecurity report in English.
Located in News / News from the Member States
Getting ready for the next European Cyber Security Challenge
Located in News / ENISA News
Report/Study Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M communications. It also aims to support decision makers to comprehend the landscape and take informed decisions regarding cyber-security by incorporating consolidated information from the European Network & Information Security (NIS) threat landscape evolution.
Located in Publications
Report/Study Hardware Threat Landscape and Good Practice Guide
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their products are exposed to. Moreover it supports end-users who want to understand security aspects related to future products/technologies and provides guidance on how existing good practices for the design, development, and implementation of embedded, mobile, and/or personal computing devices can contribute in providing protection.
Located in Publications
Report/Study ENISA Threat Landscape Report 2016
The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of cyber-crime monetization”. Undoubtedly, optimization of cyber-crime turnover was THE trend observed in 2016.
Located in Publications
File Threat Taxonomy
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in Topics / / Threat Landscape / ENISA Threat Landscape
ENISA Thematic Landscapes
Located in Topics / Threat and Risk Management / Threat Landscape
Threat Landscape of Internet Infrastructure
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information