Search results

13 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Troff document Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
Located in Publications
Report/Study Troff document Web 2.0 Security and Privacy
Along with the report, a survey was conducted of 1500 users from 3 European Countries to collect information on attitudes to Web 2.0 security issues. The main body of this report describes in detail these risks and others, based around a set of architectural patterns characterising the Web 2.0 paradigm shift. It then recommends a comprehensive set of initiatives in web standards and architecture, as well as policy actions.
Located in Publications
Cyber security key for the successful adoption of mobile payments
ENISA publishes good practices and recommendations for payment providers and financial institutions following an analysis of the security of mobile payments and digital wallets.
Located in News / ENISA News
Report/Study Smartphone Secure Development Guidelines
This document is an updated version of the Smartphone Development Guidelines published by ENISA in 2011. New developments in both software and hardware have been translated into new significant threats for the mobile computing environment, highlighting the need for an update of the document.
Located in Publications
File PDF document COIT Mitigation Stategies Published Version.pdf
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Consumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open.
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Press Release Octet Stream “Using national roaming to mitigate mobile network outages” New report by EU cyber security Agency ENISA
Today, the EU’s cyber security agency ENISA published a new report about how mobile roaming could be used nationally to mitigate large mobile network outages. This report aims to provide national telecom regulators with a portfolio of possible options as well as the pros and cons of different national roaming schemes from a security and resilience perspective.
Located in News / ENISA News
Mobile attacks and defense: from infrastructure to application
This year the agency is updating the “Smartphone Secure Development Guidelines” and publishing a study on security for mobile payments. To validate the findings of the study and discuss future challenges, ENISA organizes a workshop in Berlin, Germany on 10th of November 2016 from 10:00 - 17:00.
Located in Events
ENISA Video File Pascal source code Smartphones Video clip
ENISA highlights risks & opportunities of smartphones in video clip, supporting their report on the topic launched 10/12/2010. The video clip outlines highlights of the ENISA report which identifies the top security risks and opportunities of smartphone use and gives practical security advice for businesses, consumers and governments. Top risks include spyware, poor data cleansing when recycling phones, accidental data leakage, and unauthorised premium-rate phonecalls and SMSs.
Located in Press & Media / Audiovisual and Multimedia Gallery / Videos
Security is key for BYOD
Whether it’s a laptop, tablet or smartphone, more and more of us are choosing to “bring your own device” (BYOD) to carry out tasks in the workplace, or perform work activities from home or other locations. The trend, also known as consumerization of IT (COIT), can be very attractive to both employers and workers, offering flexibility both ways.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information