The 6th edition of the NIS Investments report reveals investments shifting from people to technology,…
The 6th edition of the NIS Investments report reveals investments shifting from people to technology,…
The 2025 ENISA Threat Landscape shows that threat groups are reusing tools and techniques, introducing new attack…
The European Union Agency for Cybersecurity (ENISA) and the European Commission signed a contribution agreement,…
The EU Agency for Cybersecurity (ENISA) publishes a technical guideline for the security measures of the NIS2…
ENISA has published a new report to explore the paths to global acceptance of the eIDAS auditing framework for trust service providers (TSPs) issuing qualified website authentication certificates (QWACs).
The fight against cybercrime, requires the involvement of Law Enforcement Agencies, which supported by CSIRTS are likely to be better positioned to investigate complex criminal structures.
NCSC-NL has published four new guides on how to set up your own cybersecurity collaboration [1]. These guides and corresponding roadmaps are available on the NCSC website [2].
Established as the main EU civil cybersecurity exercise, Cyber Europe 2018 took place on 6 and 7 June.
A new ENISA report aims to identify the cybersecurity threats to European society and to identify priorities in research that will lead to mitigations before those cybersecurity threats materialise.
ENISA is happy to announce that Ulrich Latzenhofer from RTR Austria will be the new chair of the Article 19 Expert Group which focuses on security of electronic trust services in the EU.
The eIDAS Regulation (EU) No 910/2014, lays down requirements for qualified electronic signature creation devices (QSCD) to ensure the functionality of advanced electronic signatures and seals. In the specific context of QSCD however, security…
A new ENISA report aims to provide a glimpse into the costs, incentives, and impact related to discovering and disclosing vulnerabilities in information security.
In the world of the internet, security is a fast moving field and cyber-attacks are changing constantly. What may have been an appropriate security measure at one point in time may be considered unnecessary and disproportionate later on.
Pagination
Stay updated with ENISA! Sign up for email alerts on publications, events, vacancies, and more.