Search results

641 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Security is key for BYOD
Whether it’s a laptop, tablet or smartphone, more and more of us are choosing to “bring your own device” (BYOD) to carry out tasks in the workplace, or perform work activities from home or other locations. The trend, also known as consumerization of IT (COIT), can be very attractive to both employers and workers, offering flexibility both ways.
Located in News / ENISA News
Report/Study Troff document Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area.
Located in Publications
Consumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open.
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Report/Study EU Cyber Cooperation-The Digital Frontline
We all share a common interest in guaranteeing a free, safe and sound life in cyberspace. ENISA firmly believes EU cyber cooperation is crucial to establishing a proficient and coherent approach to Network and Information Security (NIS). This includes coordination throughout Europe as well as worldwide in both the public and private sectors. In many ways, it is this global dimension that distinguishes cyber security from what we have referred to in the past as information security. What are the next steps to build stronger bridges and common ground in these ever-evolving cyber scenarios? What are the EU institutions’, the private sector’s and the citizens’ next challenges in responding to destructive digital assaults?
Located in Publications
Fight against Cybercrime
In 2010 ENISA started its support for operational collaboration between the CSIRTs in the Member States on the one hand and Law Enforcement Agencies (LEA) on the other hand.
Located in Topics / CSIRTs and communities / Law Enforcement
ENISA supports Digital Resilience at Amsterdam Grand Conference
ENISA Executive Director, Professor Udo Helmbrecht is among delegates joining European Commission Vice President Neelie Kroes at the Building a Resilient Digital Society conference, in Amsterdam today [16th October].
Located in News / ENISA News
Overview of Europe’s cyber security challenges & the Agency's work in the European Parliament
ENISA's ED speaks at European Parliament
Located in News / ENISA News
Report/Study Incentives and Barriers to Information Sharing
Given the acknowledged importance of information sharing, this report sets out findings from a research project into the barriers to and incentives for information sharing in the field of network and information security, in the context of peer-to-peer groups such as Information Exchanges (IE) and Information Sharing Analysis Centres (ISACs).
Located in Publications
Report/Study chemical/x-pdb Priorities for Research on Current and Emerging Network Trends
This study was carried out under the umbrella of ENISA by a group of experts in the relevant areas who are experienced in running security-related research projects, in developing and implementing new networking technologies and in creating policies. A number of areas, comprising one or more technologies and policies that are currently in use or where there are plans to introduce them within a few years, were identified as having an impact on the resilience of networks. Some of these areas are already well established, described and standardised, some are in the very early stages of development and, finally, some will only come into broad use over a very long time frame (more than five years). Five areas have been assessed as presenting the biggest need for research within a window of three to five years: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. These areas are analysed and described in detail in the core of this report.
Located in Publications
Report/Study National Exercise - Good Practice Guide
ENISA prepared a good practice guide to assist authorities in Member States to better understand the complexities of exercises and help them prepare local and national ones. This guide was prepared by interviewing experts on exercises throughout the EU and beyond with the aim to identify good practices that were already applied and proved to be effective. This guide examines these practices by first giving an introduction to the subject of exercises, then reviewing the life-cycle of an exercise (identifying, planning, conducting, and evaluating) systematically. Also, the roles of the involved stakeholders are presented. Throughout the guide, good practices are highlighted for easy identification. Still, this guide is but an introduction to many of these issues. To help take readers further, this guide also includes references to some additional materials that can help authorities to organize exercises to help take you further. Beyond the materials, the interviews with experts revealed that there is an enormous wealth of knowledge and experience with exercises from which others can learn. Just as one major benefit of exercises is to build cooperation across the sector, the interviewed experts expressed much interest in cooperation themselves. And for those new to exercises, one of the most effective steps you can take will be to participate with these experts in cooperative efforts across the EU, developing contacts, and asking further questions.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information