The EU Agency for Cybersecurity launches today ISAC in a BOX a comprehensive online toolkit to support the establishment, development and evaluation of Information Sharing and Analysis Centres (ISACs).
ENISA makes recommendations on EU-wide election cybersecurity
In the context of the upcoming elections for the European Parliament, today the EU Agency for Cybersecurity ENISA publishes an opinion paper on the cybersecurity of elections and provides concrete and forward-looking recommendations to improve…
ENISA supports CSIRT-CY in maturity assessment
On 7 March 2019, certified experts from ENISA, together with representative from the National Cybersecurity Centre of Portugal concluded the peer review process of assessing maturity level of National CSIRT of The Republic of Cyprus.
Going to the market for Cybersecurity Market Analysis
The European Union Agency for Cybersecurity (ENISA) organised its first conference on cybersecurity market analysis last week for EU cybersecurity market stakeholders to share experiences and initiate the debate on how to best perform EU…
Procure secure: ENISA’s new guide for monitoring cloud computing contracts
Procurement of cloud computing services is an increasingly important task for governments and businesses across the EU - and information security is a key pain-point.
Privacy-a fundamental right-between economics and practice
ENISA releases two new reports on privacy economics and case studies of online practices in collecting and storing personal data in the EU
Crossing a bridge: the first EU cybersecurity certification scheme is availed to the Commission
The European Union Agency for Cybersecurity formally transmits to the European Commission the first candidate cybersecurity certification scheme on Common Criteria.
Towards the emerging EU framework on certification
On 1 March 2018, ENISA hosted a conference entitled “Towards the emerging EU framework on certification”.
Encrypted Traffic Analysis: Use Cases & Security Challenges
The EU Agency for Cybersecurity explores encrypted traffic analysis’ use cases and identifies security challenges & opportunities
Pagination