ENISA
https://www.enisa.europa.eu
Smart Grid Threat Landscape and Good Practice Guide
https://www.enisa.europa.eu/publications/smart-grid-threat-landscape-and-good-practice-guide
ENISA report on threats in the area of smart grids and good practice guide. No publisherThreat Intelligence2014/01/30 00:05:00 GMT+2Report/StudyConsumerization of IT: Top Risks and Opportunities
https://www.enisa.europa.eu/publications/consumerization-of-it-top-risks-and-opportunities
This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent trend where user-owned consumer oriented hard- and software spreads in business environments. COIT is considered as a term embracing the recent trend known as Bring-Your-Own-Device (BYOD).No publisherRisk ManagementThreat Intelligence2012/10/18 01:05:00 GMT+2Report/StudyThreat Landscape and Good Practice Guide for Software Defined Networks/5G
https://www.enisa.europa.eu/publications/sdn-threat-landscape
This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, existing security mechanism and and good practices for SDN/5G/NFV has been identified. Finally based in the collated information technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G is provided.No publisherThreat Intelligence2016/01/27 00:00:00 GMT+2Report/StudyBig Data Threat Landscape
https://www.enisa.europa.eu/publications/bigdata-threat-landscape
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.No publisherBig DataThreat Intelligence2016/01/27 00:00:00 GMT+2Report/Study