Search results

641 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Press Release The economics of vulnerability disclosure
A new ENISA report aims to provide a glimpse into the costs, incentives, and impact related to discovering and disclosing vulnerabilities in information security.
Located in News / ENISA News
Report/Study Economics of Vulnerability Disclosure
Vulnerability disclosure refers to the process of identifying, reporting and patching weaknesses of software, hardware or services that can be exploited. The different actors within a vulnerability disclosure process are subject to a range of economic considerations and incentives that may influence their behaviour. These economic aspects of vulnerability disclosure are often overlooked and poorly understood, but may help explain why some vulnerabilities are disclosed responsibly while others are not. This study serves as a follow up to the 2015 ENISA Good Practice Guide on Vulnerability Disclosure and has the overarching objective to improve the understanding of the economics of vulnerability disclosure by providing a glimpse into the costs, incentives and impact related to discovering and disclosing vulnerabilities
Located in Publications
Report/Study Guideline on assessing security measures in the context of Article 3(3) of the Open Internet regulation
This guideline regards the security exceptions in the EU net neutrality rules. It offers a checklist and an evaluation form to help NRAs in deciding whether or not a provider is allowed to take a security measure, for example blocking certain traffic, to protect the security of networks, services using the networks, or end-user equipment. This guideline has been developed in close collaboration with the telecoms regulatory authorities in the Article 13a Expert Group and the BEREC Expert Group on Net Neutrality.
Located in Publications
File Adequate and effective cybersecurity: state of play
Speech by ENISA’s Executive director, prof. Dr. Udo Helmbrecht – Cybersecurity Conference organised by the Austrian Presidency of the Council of the European Union.
Located in Publications / ED's speeches
More than 100 experts attend the joint NSA-ENISA Cybersecurity workshop in Bratislava
ENISA and the National Security Authority of Slovakia organized a cybersecurity workshop, with the goal of bringing together cybersecurity experts working in critical sectors like energy and finance, experts from CSIRTs and experts working at the national authorities with supervision tasks under the NIS Directive.
Located in News / ENISA News
Join the 1st transport cybersecurity conference
On 23 January 2019, the EU Agency for Cybersecurity ENISA will organise the ‘Transport Cybersecurity Conference’, in cooperation with the European Commission (DG MOVE), the European Aviation Safety Agency (EASA), the European Union Agency for Railways (ERA), and the European Maritime Safety Agency (EMSA).
Located in News / ENISA News
File Getting down to business - ENISA in the EU Cybersecurity Certification Framework
Located in Publications / ENISA position papers and opinions
File Financial Fraud in the Digital Space
Located in Publications / ENISA position papers and opinions
Good practices for identifying and assessing cybersecurity interdependencies
A glance at the interdependency landscape reveals several emerging interdependencies between operators of essential services (OES) and digital service providers (DSP), at both system and service level. Due to these interdependencies, there is an increasing number of cybersecurity incidents that either propagated across organisations (often across borders), or had a cascading effect at the level of essential services.
Located in News / ENISA News
Press Release Pascal source code EU cybersecurity organisations agree on 2019 roadmap
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information