
This report provides technical guidance to support the implementation of the NIS2 Directive for several types of entities in the NIS2 digital infrastructure, ICT service management and digital providers sectors. The…
This report provides technical guidance to support the implementation of the NIS2 Directive for several types of entities in the NIS2 digital infrastructure, ICT service management and digital providers sectors. The…
The NIS360 is a new ENISA product that assesses the maturity and criticality of sectors of high criticality under the NIS2 Directive, providing both a comparative overview and a more in-depth analysis of each sector. The NIS360 is designed to…
This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (…
In this report we highlight some of the most important cybersecurity research and innovation topics explored in the EU and around the world.
With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.…
The report outlines the findings related to botnet, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the findings on cryptojacking, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the trends related to cyber espionage attacks and provides guidelines to mitigate them.
The report outlines the findings on data breach, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the findings on ddos attacks, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
The report outlines the findings on identity theft, provides a description and analysis of the domain and lists relevant recent incidents. A series of proposed actions for mitigation is provided.
This report provides an analysis of the top 15 cyber threats that dominated the period between January 2019 and April 2020.
Pagination