ENISA
https://www.enisa.europa.eu
Ασφάλεια καταστημάτων εφαρμογών – πέντε γραμμές άμυνας – Νέα έκθεση από τον Οργανισμό Κυβερνοασφάλειας ENISA
https://www.enisa.europa.eu/news/enisa-news/prs-in-gr/3913c33c63bb3b53b93b1-3ba3b13c43b13c33c43b73bc3c43c93bd-3b53c63b13c13bc3bf3b33bd-2013-3c03bd3c43b5-3b33c13b13bc3bc3c2-3bc3c53bd3b13c2-2013-39d3b1-3ba3b83b53c33b7-3b13c0-3c43bf3bd-39f3c13b33b13bd3b93c33bc-39a3c53b23b53c13bd3bf3b13c33c63bb3b53b93b13c2-enisa/view
Ο ENISA δημοσιεύει σήμερα μία νέα έκθεση σχετικά με την Ασφάλειατωνκαταστημάτων εφαρμογώνστην οποία τάσσεται υπέρ της υιοθέτησης μίας βασικής ομάδας 'Πέντε γραμμών άμυνας 'ενάντια στο κακόβουλο λογισμικό (malware).No publisherOnline SafetySMEsIdentity & TrustResiliencePrivacyResilience2011/09/13 15:09:03 GMT+2FileNew report: App-store security– the 'five lines of defence'
https://www.enisa.europa.eu/news/enisa-news/app-store-security2013-the-five-lines-of-defence-new-report-by-eu-cyber-security-agency-enisa
The Agency today publishes a new report on app-store security where it advocates for a baseline set of ‘five lines of defence ‘ against malware. No publisherSMEsResiliencePrivacyIdentity & TrustResilienceOnline Safety2011/09/13 00:00:00 GMT+2Press ReleaseMobile malware attacks & the security of app-stores: Agency analysis
https://www.enisa.europa.eu/news/enisa-news/mobile-malware-attacks-the-security-of-app-stores-agency-analysis
The Agency has made a brief analysis of a recent spate of malware attacks on smartphone platforms, and presents a new 'top-ten-risks' for smartphones list.No publisherPrivacyIdentity & Trust2011/03/16 11:50:00 GMT+2News ItemPrivacy, Accountability and Trust – Challenges and Opportunities
https://www.enisa.europa.eu/publications/pat-study
In the study, we focus on some of the available technologies and research results addressing privacy and data protection and topics related to, or influencing privacy, such as consent, accountability, trust, tracking and profiling. The objective is to provide a comprehensive and realistic view of both limitations generated and possibilities provided by technologies in the case of personal data protection rights.No publisherIdentity & TrustPrivacy2011/03/08 16:30:00 GMT+2Report/StudySurvey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
https://www.enisa.europa.eu/publications/survey-pat
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base. No publisherIdentity & TrustPrivacy2011/01/31 15:45:00 GMT+2Report/StudyData breach notifications in the EU
https://www.enisa.europa.eu/publications/dbn
The introduction of a European data breach notification requirement for the electronic communication sector introduced in the review of the ePrivacy Directive (2002/58/EC) is an important development with a potential to increase the level of data security in Europe and foster reassurance amongst citizens on how their personal data is being secured and protected by electronic communication sector operators. Against this background, ENISA reviewed the current situation in order to develop a consistent set of guidelines addressing the technical implementation measures and the procedures, as described by Article 4 of the reviewed Directive 2002/58/EC.No publisherPrivacyIdentity & TrustGood Practice2011/01/13 17:15:00 GMT+2Report/StudySecurity, is there an app for that? EU’s cyber-security agency highlights risks & opportunities of smartphones
https://www.enisa.europa.eu/news/enisa-news/security-is-there-an-app-for-that-eu2019s-cyber-security-agency-highlights-risks-opportunities-of-smartphones
A new ENISA report identifies the top security risks and opportunities of smartphone use and gives practical security advice for businesses, consumers and governments. Top risks include spyware, poor data cleansing when recycling phones, accidental data leakage, and unauthorised premium-rate phonecalls and SMSs.No publisherIdentity & Trust2010/12/10 09:10:00 GMT+2Press ReleaseData Breach Notifications
https://www.enisa.europa.eu/media/news-items/data-breach-notifications/view
Data Breach Notifications. Two brief PPTs by Dr Udo Helmbrecht Executive Director of ENISA participating in a panel discussion at the European Data Protection and Privacy Conference 30/11/2010.No publisherEuropean Union InstitutionsIdentity & TrustIncident ReportingPrivacy2010/11/30 15:20:00 GMT+2FileFocus on Cloud Computing at 'European Security Round Table'
https://www.enisa.europa.eu/news/enisa-news/european-security-round-table-focussing-on-clloudon-cloud-computing
The European Security Round Table (ESRT), a forum for EU-centered security and defence topics, organized on the 8th of June a debate titled “Moving to the Cloud: Risks and Opportunities – Assessment for Local Entities.” in Brussels.No publisherIdentity & TrustInternet of thingsPrivacy2010/06/10 10:25:00 GMT+2News ItemFocus article: Mobile Social Networking in the limelight
https://www.enisa.europa.eu/news/enisa-news/focus-article-social-networking
Focus article on Mobile Social NetworkingNo publisherNetwork and Information Security AwarenessIdentity & TrustGood PracticePrivacy2010/06/02 08:45:00 GMT+2News ItemFocus article: Mobile Social Networking
https://www.enisa.europa.eu/media/news-items/focus-article-mobile-social-networking/view
Focus article: Mobile Social Networking. Interview with Nicole FalessiNo publisherNetwork and Information Security AwarenessIdentity & TrustPrivacyENISA events2010/06/02 08:40:07 GMT+2FileHelmbrecht – “Security is a key element of Privacy & Data Protection”
https://www.enisa.europa.eu/news/enisa-news/helmbrecht-2013-201csecurity-is-a-key-element-of-privacy-and-data-protection201d
The Executive Director of ENISA, Dr Udo Helmbrecht, made two presentations at key ICT security policy conferences in Spain, in conjunction with the Spanish EU Presidency, underlining that “Security is a key element of Privacy and Data Protection”.No publisherCritical Information Infrastructure Protection (CIIP)PrivacyIdentity & TrustRisk ManagementCSIRTsInternet of thingsResilienceIncident Reporting2010/05/28 09:45:00 GMT+2News ItemSecurity Privacy and Dataprotection
https://www.enisa.europa.eu/media/news-items/security-privacy-and-dataprotection/view
Presentation by Dr Udo Helmbrecht, Spain 24 May 2010 on Security a key element of Privacy and DataprotectionNo publisherPrivacyIdentity & Trust2010/05/28 09:36:42 GMT+2FileReinforced role for ENISA in the Digital Agenda
https://www.enisa.europa.eu/news/enisa-news/reinforced-role-for-enisa-in-the-digital-agenda
Reinforced role for ENISA in a renewed regulation, with a more active role in CERTs, Trust and Security, and in cyber crime prevention.No publisherCSIRTsEuropean Union InstitutionsIdentity & Trust2010/05/20 16:30:00 GMT+2News ItemFlying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II
https://www.enisa.europa.eu/publications/flying-2.0-enabling-automated-air-travel-by-identifying-and-addressing-the-challenges-of-iot-rfid-technology-1
This is Annex II - "Risk Assessment Spreadsheet" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".No publisherRisk ManagementIdentity & TrustPrivacy2010/04/12 09:30:00 GMT+2Report/Study