• Securing Machine Learning Algorithms

    Based on a systematic review of relevant literature on machine learning, in this report we provide a taxonomy for machine learning algorithms, highlighting core functionalities and critical stages. The report also presents a detailed analysis of...

    Published on December 14, 2021
  • Foresight Challenges

    This report aims to highlight the most relevant foresight methods based on ubiquity or suitability to ENISA’s core needs to adequately address future cybersecurity threats and shape a more secure society. In fact, foresight enables reflection on...

    Published on November 22, 2021
  • Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving

    This report, drafted jointly by ENISA and JRC, aims to provide insights on the cybersecurity challenges specifically connected to the uptake of AI techniques in autonomous vehicles. It describes the policy context at both the European and...

    Published on February 11, 2021
  • Artificial Intelligence Cybersecurity Challenges

    This report presents the Agency's active mapping of the AI cybersecurity ecosystem and its Threat Landscape, realised with the support of the Ad-Hoc Working Group on Artificial Intelligence Cybersecurity. The ENISA AI Threat Landscape not only lays...

    Published on December 15, 2020
  • Cybersecurity Stocktaking in the CAM

    In this document, the CAM ecosystem and insights involving stakeholder interactions, critical services and infrastructures, standards, as well as security measures are described. The insights gained from the survey, interviews, and desk research...

    Published on November 20, 2020
  • Guidelines for Securing the Internet of Things

    This ENISA study defines guidelines for securing the supply chain for IoT. ENISA with the input of IoT experts created security guidelines for the whole lifespan: from requirements and design, to end use delivery and maintenance, as well as...

    Published on November 09, 2020
  • Good Practices for Security of IoT - Secure Software Development Lifecycle

    This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT...

    Published on November 19, 2019
  • Industry 4.0 - Cybersecurity Challenges and Recommendations

    In this short paper ENISA provides identifies the main challenges to the adoption of the security measures and security of Industry 4.0 and Industrial IoT. Moreover, ENISA lists high-level recommendations to different stakeholder groups in order to...

    Published on May 20, 2019
  • IoT Security Standards Gap Analysis

    This study analyses the gaps and provides guidelines for, in particular, the development or repositioning of standards, facilitating the adoption of standards and governance of EU standardisation in the area of NIS.

    Published on January 17, 2019
  • Good Practices for Security of Internet of Things in the context of Smart Manufacturing

    This ENISA study aims at addressing the security and privacy challenges related to the evolution of industrial systems and services precipitated by the introduction of IoT innovations. The main objectives were to collect good practices to ensure...

    Published on November 19, 2018
  • Towards secure convergence of Cloud and IoT

    The aim of this work is to provide a high-level overview on the security issues to IoT developers and IoT integrators that make use of IoT Cloud Computing and Cloud service Providers (CSPs) of IoT Cloud offerings.

    Published on September 17, 2018
  • Baseline Security Recommendations for IoT

    The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a...

    Published on November 20, 2017
  • Security and Resilience of Smart Home Environments

    This study aims at securing Smart Home Environments from cyber threats by highlighting good practices that apply to every step of a product lifecycle: its development, its integration in Smart Home Environments, and its usage and maintenance until...

    Published on December 01, 2015
Browse the Topics

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information