Search results 68 items matching your search terms. Filter the results. Item type Select All/None CHIHT Entry Cloud Security Guide Report/Study Page EQR Folder EQR Issue Event File Folder Form Folder Location Image Link News Item Person Press Release Procurement Procurement Folder Video file Recruitment Folder Sub Survey Survey Survey Matrix Survey Matrix Question Survey Select Question Survey Text Question Testimony Collection Universities Folder Course Vacancy ZIP Folder Cyber security info note Info note IoT Tool Training Training Material Topic NCSS Evaluation Tool NIS Visual Tool New items since Yesterday Last week Last month Ever Sort by relevance · date (newest first) · alphabetically The legal, standartization and certification frameworks of trust service security Ben Wilson (DigiCert) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Main security risks for trust service providers Kim Nguyen (Bundesdruckerei / D-Trust) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Main security risks for trust service providers Audun Jøsang (University of Oslo) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Main security risks for trust service providers Iñigo Barreira (Izenpe) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Security aspects of the new trust services defined in the draft Regulation Alejandro Elices (Atos Research) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Mitigating the impact of security incidents in trust services providers Steve Roylance (GlobalSign) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings Mitigating the impact of security incidents in trust services providers Robert van de Rijt (Logius) Located in Events / Workshop on Security Aspects of TSPs 2013 / proceedings proceedings Located in Events / Workshop on Security Aspects of TSPs 2013 EU cyber security Agency ENISA calls for secure e-banking and e-payments: non-replicable, single-use credentials for e-identities are needed in the financial sector Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of inadequate authentication mechanisms according to a new study by the EU Agency ENISA. Located in News / ENISA News EU:s IT-säkerhetsmyndighet ENISA kräver säkrare e-banking samt e-betalningar: icke-replikerbara, engångskoder för e- identiteter behövs i den finansiella sektorn Olika bankdosor, apparater, mobiltelefoner, e-signaturer, m.m. används för att autentisera våra e-identiteter online. Ändå har vissa finansiella institutioner fortfarande otillräckliga mekanismer för autentisering med tanke på riskerna menar EU:s myndighet ENISA i en ny studie. Located in News / ENISA News ← Previous 1 2 3 4 5 6 7 Next →