Search results

99 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Located in Topics / Standards and Certification / Certification
ENISA Launches Public Consultation for First Candidate Cybersecurity Certification Scheme
The EUCC Candidate Scheme for ICT Products, set to replace the SOG-IS, is released today for public feedback.
Located in News / ENISA News
Report/Study application/x-troff-me Cybersecurity Certification: EUCC Candidate Scheme
Following the request from the European Commission in accordance with Article 48.2 of the Cybersecurity Act, ENISA has set up an Ad Hoc Working Group to support the preparation of a candidate EU cybersecurity certification scheme as a successor to the existing schemes operating under the SOG-IS MRA. This has been named EUCC scheme (Common Criteria based European candidate cybersecurity certification scheme) and it looks into the certification of ICT products cybersecurity, based on the Common Criteria, the Common Methodology for Information Technology Security Evaluation, and corresponding standards, respectively, ISO/IEC 15408 and ISO/IEC 18045.
Located in Publications
The EU Cybersecurity Act’s first anniversary: one step closer to a cyber secure Europe
The CSA has put the conversation of Cybersecurity into action through a stronger ENISA and the creation of the EU cybersecurity certification framework.
Located in News / ENISA News
Press Release EU Cybersecurity: A newly-formed stakeholders group will work on the cybersecurity certification framework
Located in News / ENISA News
Encrypted Traffic Analysis: Use Cases & Security Challenges
The EU Agency for Cybersecurity explores encrypted traffic analysis’ use cases and identifies security challenges & opportunities
Located in News / ENISA News
Report/Study Advancing Software Security in the EU
This study discusses some key elements of software security and provides a concise overview of the most relevant existing approaches and standards while identifying shortcomings associated with the secure software development landscape, related to different inherent aspects of the process. Lastly, it provides a number of practical considerations relevant to the different aspects of software development within the newly established EU cybersecurity certification framework and the EU cybersecurity certification schemes.
Located in Publications
File 04_03-Ruiz.pdf
Located in Events / Conference: Cybersecurity Standardization 2020 / Presentations
File Octet Stream 03_06-Okuya.pdf
Located in Events / Conference: Cybersecurity Standardization 2020 / Presentations
File Octet Stream 01_06-Niedziella.pdf
Located in Events / Conference: Cybersecurity Standardization 2020 / Presentations

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information