Search results

18 items matching your search terms.
Filter the results.
Item type


















































New items since



Sort by relevance · date (newest first) · alphabetically
Supporting the deployment of the EU Cybersecurity Certification Framework
A validation workshop has been delivered by the European Union Agency for Cybersecurity to debate with stakeholders on activities in support of the deployment of the EU cybersecurity certification framework.
Located in News / ENISA News
Open platform and tools to facilitate the collaboration among Computer Security Incident Response Teams
Collaboration among European Computer Security Incident Response Teams (CSIRTs) has become essential for cyber security operations in Europe.
Located in News / ENISA News
Report/Study ENISA threat landscape for 5G Networks
This report draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks. Its added value lays with the creation of a comprehensive 5G architecture, the identification of important assets (asset diagram), the assessment of threats affecting 5G (threat taxonomy), the identification of asset exposure (threats – assets mapping) and an initial assessment of threat agent motives. The information produced for this Threat Landscape is based on publicly available information published by 5G standardisation groups and bodies (i.e. ETSI, 3GPP, 5GPPP) and 5G stakeholders such as operators, vendors, national and international organisations. An expert group with experts from mobile operators, vendors, research and European Commission has contributed to ENISA’s work with information on existing 5G material, current developments in the market and research and quality assurance of the current document. Moreover, the members of the NIS CG, European Commission and ENISA have reviewed the current document.
Located in Publications
Report/Study Good Practices for Security of IoT - Secure Software Development Lifecycle
This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.
Located in Publications
ENISA cybersecurity certification preparation underway
ENISA, the European Union Agency for Cybersecurity is hosting the first meeting to prepare a candidate cybersecurity certification scheme.
Located in News / ENISA News
Report/Study Port Cybersecurity - Good practices for cybersecurity in the maritime sector
Developed in collaboration with several EU ports, this report intends to provide a useful foundation on which CIOs and CISOs of entities involved in the port ecosystem, especially port authorities and terminal operators, can build their cybersecurity strategy. The study lists the main threats posing risks to the port ecosystem and describes key cyber-attack scenarios that could impact them. This approach allowed the identification of security measures that ports shall put in place to better protect themselves from cyberattack. The main measures identified intend to serve as good practices for people responsible for cybersecurity implementation. The study can be useful for other stakeholders in the broader community within the port ecosystem, such shipping companies and maritime policy makers.
Located in Publications
Press Release text/texmacs How can EU ports tackle new cyber threats?
ENISA, the European Union Agency for Cybersecurity publishes "Good practices for Cybersecurity in the Maritime Sector - Port Security", a report providing guidance for ports to strengthen their cybersecurity.
Located in News / ENISA News
Report/Study ECMAScript program State of Vulnerabilities 2018/2019 - Analysis of Events in the life of Vulnerabilities
The purpose of this report is to provide an insight on both the opportunities and limitations the vulnerability ecosystem offers. By using the vulnerabilities published during the year of 2018 and Q1-Q2 of 2019 as a vehicle, this report goes beyond the standard exploratory analysis, which is well captured by many industry whitepapers and reports, and attempts to answer questions related to the reliability, accuracy of the vulnerability sources and the widely accepted evaluation metrics. In addition, the report leverages established vulnerability taxonomies and frameworks to explore and identify more intrinsic relationships and characteristics.
Located in Publications
CyLEEx19: Inside a simulated cross-border cyber-attack on critical infrastructure
Today, ENISA and Europol’s European Cybercrime Centre jointly organise the first exercise of its kind to test the EU Law Enforcement Emergency Response Protocol.
Located in News / ENISA News
ENISA organises Maritime Cybersecurity Workshop in Lisbon
On the 26th of November, ENISA organised a workshop in Lisbon with the objective of strengthening the cybersecurity of EU ports. The workshop was hosted by the European Maritime Safety Agency (EMSA) and brought together over 60 stakeholders from the EU maritime sector.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information