Search results

429 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
What is a CSIRT and how can it help me?
With the COVID-19 outbreak, many SMEs, businesses and citizens had to make a giant leap into the online world. Europeans can count on more than 500 Computer Incident Response Teams (CSIRT) to respond to cyber security incidents and attacks and, since 2017, on the CSIRTs Network. Learn more about what is CSIRT and how it can help you.
Located in News / ENISA News
File Bolstering Incident Response in Europe
Located in Topics / COVID19
Training material to enhance cooperation across CSIRTs and Law Enforcement
In an effort to further enhance the cooperation between CSIRTs and law enforcement (LE), and their interaction with the judiciary, ENISA has developed some additional training material addressing the cooperation across these communities.
Located in News / ENISA News
File PDF document Support the fight against cybercrime Training material CSIRT LE JUD Cooperation Handbook
Located in Topics / / Documents / Cooperation across CSIRTs and Law Enforcement
File PDF document Support the fight against cybercrime Training material Legal Org aspects of CSIRT LE Coop Handbook
Located in Topics / / Documents / Cooperation across CSIRTs and Law Enforcement
Image CSIRTS cooperation
Located in Topics / / Online training material / Images
Cooperation across CSIRTs and Law Enforcement
Located in Topics / / Online training material / Documents
New Training: on orchestration of CSIRT Tools
The EU agency for Cybersecurity introduces new training materials to support Member States’ CSIRTs.
Located in News / ENISA News
Report/Study SIS package Encrypted Traffic Analysis
This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of encrypted malware, file/device/website/location fingerprinting and DNS tunnelling detection. In addition, the report discusses recent research in TLS practices identifying common improper practices and proposing simple but efficient countermeasures like certificates validation and pinning, minimize exposed data over HTTP redirects, using proper private keys and the latest versions of TLS (i.e. 1.2 and 1.3), deprecating older ones and employing certificate signing and by a trusted CA.
Located in Publications
Orchestration of CSIRT Tools
Located in Topics / / Online training material / Documents

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information