ENISA
https://www.enisa.europa.eu
Smartphone Secure Development Guidelines
https://www.enisa.europa.eu/publications/smartphone-secure-development-guidelines-2016
This document is an updated version of the Smartphone Development Guidelines published by ENISA in 2011. New developments in both software and hardware have been translated into new significant threats for the mobile computing environment, highlighting the need for an update of the document.No publisherInternet of thingsMobile ApplicationsMobile Security2017/02/10 00:00:00 GMT+2Report/StudyCyber security key for the successful adoption of mobile payments
https://www.enisa.europa.eu/news/enisa-news/cyber-security-key-for-the-successful-adoption-of-mobile-payments
ENISA publishes good practices and recommendations for payment providers and financial institutions following an analysis of the security of mobile payments and digital wallets. No publishercybersecurityMobile ApplicationsFinanceMobile Security2016/12/19 11:33:01 GMT+2News ItemSecurity of Mobile Payments and Digital Wallets
https://www.enisa.europa.eu/publications/mobile-payments-security
The primary objective of this paper is the production of guidelines to assist mobile payment developers and mobile payment providers towards recommended security controls which if implemented would help ensure that consumers, retailers and financial institutions are all safeguarded from cyber threats. A secondary objective is to define minimum measures that should be followed by mobile payment providers in the EU, and to provide security recommendations for organisations wishing to provide mobile payment services within the EU.No publisherMobile Security2016/12/19 00:00:00 GMT+2Report/StudyIncident handling training workshop by ENISA
https://www.enisa.europa.eu/news/enisa-news/incident-handling-training-workshop-by-enisa
On the 18th – 20th October 2016, ENISA organised together with the Computer Security Incident Response Team Slovakia (CSIRT.sk) and the Slovak Armed Forces a workshop on incident handling.No publisherTrainingTrainingscybersecurityIncident ManagementCSIRTsNIS EventsNetwork and Information Security AwarenessMobile Security2016/10/20 14:40:00 GMT+2News ItemMobile attacks and defense: from infrastructure to application
https://www.enisa.europa.eu/events/mobile-attacks-and-defense-from-infrastructure-to-application
This year the agency is updating the “Smartphone Secure Development Guidelines” and publishing a study on security for mobile payments. To validate the findings of the study and discuss future challenges, ENISA organizes a workshop in Berlin, Germany on 10th of November 2016 from 10:00 - 17:00.No publisherMobile ApplicationsMobile Security2016/10/13 10:40:00 GMT+2EventMobile Threats Incident Handling: Updated ENISA material
https://www.enisa.europa.eu/news/enisa-news/mobile-threats-incident-handling-updated-enisa-material
No publisherMobile SecurityDigital SkillsThreat Intelligence2015/04/23 15:15:00 GMT+2News Item“Using national roaming to mitigate mobile network outages” New report by EU cyber security Agency ENISA
https://www.enisa.europa.eu/news/enisa-news/using-national-roaming-to-mitigate-mobile-network-outages201d-new-report-by-eu-cyber-security-agency-enisa
Today, the EU’s cyber security agency ENISA published a new report about how mobile roaming could be used nationally to mitigate large mobile network outages. This report aims to provide national telecom regulators with a portfolio of possible options as well as the pros and cons of different national roaming schemes from a security and resilience perspective. No publisherCritical Information Infrastructure Protection (CIIP)Mobile Security2013/11/27 02:05:00 GMT+2Press ReleaseSecurity is key for BYOD
https://www.enisa.europa.eu/news/enisa-news/security-is-key-for-byod
Whether it’s a laptop, tablet or smartphone, more and more of us are choosing to “bring your own device” (BYOD) to carry out tasks in the workplace, or perform work activities from home or other locations. The trend, also known as consumerization of IT (COIT), can be very attractive to both employers and workers, offering flexibility both ways.No publisherMobile Securitycybersecurity2013/01/07 17:05:00 GMT+2News ItemConsumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
https://www.enisa.europa.eu/publications/COIT_Mitigation_Strategies_Final_Report
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area. No publisherMobile SecuritycybersecurityRisk Management2013/01/07 16:55:00 GMT+2Report/StudyConsumerization of IT: Risk Assessment and Risk Mitigation Strategies and Good Practices
https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends/enisa-thematic-landscapes/COIT_Risk_Mitigation_Strategies
ENISA has produced a risk and opportunity assessment and risk mitigation strategies in the area of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this work is to assess the risks and identify mitigation strategies, policies and controls for the assessed risks. At the same time, mitigation has been proposed in a way that leaves the windows for the realization of the assessed opportunities open. No publishercybersecurityRisk ManagementMobile Security2012/12/19 16:30:00 GMT+2PageCOIT Mitigation Stategies Published Version.pdf
https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends/enisa-thematic-landscapes/COITMitigationStategiesPublishedVersion.pdf/view
No publisherMobile SecurityRisk Management2012/12/19 16:30:00 GMT+2FileSmartphones Video clip
https://www.enisa.europa.eu/media/multimedia/videos/smartphones-video-clip
ENISA highlights risks & opportunities of smartphones in video clip, supporting their report on the topic launched 10/12/2010. The video clip outlines highlights of the ENISA report which identifies the top security risks and opportunities of smartphone use and gives practical security advice for businesses, consumers and governments. Top risks include spyware, poor data cleansing when recycling phones, accidental data leakage, and unauthorised premium-rate phonecalls and SMSs. No publisherMobile Security2010/12/10 09:10:00 GMT+2ENISA Video FileWeb 2.0 Security and Privacy
https://www.enisa.europa.eu/publications/copy_of_report
Along with the report, a survey was conducted of 1500 users from 3 European Countries to collect information on attitudes to Web 2.0 security issues. The main body of this report describes in detail these risks and others, based around a set of architectural patterns characterising the Web 2.0 paradigm shift. It then recommends a comprehensive set of initiatives in web standards and architecture, as well as policy actions.No publisherMobile Security2009/08/12 11:10:00 GMT+2Report/Study