Threat Landscape of Internet Infrastructure
This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources (…
ENISA Threat Landscape mid year 2013
ENISA presents in this short paper a first “taste” of current developments related to the Threat Landscape 2013.
ENISA Threat Landscape Report 2018
2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as source discrete developments in motives and tactics of the most important threat agent groups, namely cyber-criminals and state-sponsored actors
Smart Grid Threat Landscape and Good Practice Guide
ENISA report on threats in the area of smart grids and good practice guide.
ENISA Threat Landscape Report 2017
2017 was the year in which incidents in the cyberthreat landscape have led to the definitive recognition of some omnipresent facts. We have gained unwavering evidence regarding monetization methods, attacks to democracies, cyber-war, transformation…
ENISA Threat Landscape for 5G Networks Report
This report is an update of the ENISA 5G Threat Landscape, published in its first edition in 2019. This document is a major update of the previous edition. It encompasses all novelties introduced, it captures developments in the 5G architecture and…
Hardware Threat Landscape and Good Practice Guide
The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their…
Threat Landscape for Smart Home and Media Convergence
The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic…
Foresight 2030 Threats
This booklet summarises upcoming challenges and provides for an assessment of the
risks. We are now ready to design the cyber secure future ahead of us.
Exploring the opportunities and limitations of current Threat Intelligence Platforms
The main objective of this report is to understand the limitations of threat information sharing and the analysis tools that are currently in use. Moreover, the second objective is to provide the relevant recommendations so that these limitations…
Pagination