ENISA Threat Landscape

Published under Threat Landscape

The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent reports from security industry, networks of excellence, standardisation bodies and other independent institutes have been analysed.

ETL 2015

ENISA’s Threat Landscape 2015 (ETL 2015)  is the fifth yearly report in sequence, summarizing top cyber threats encountered in 2015.  The 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.

See also:

ETL 2014

In the ETL 2014, details of the developments made in 2014 are consolidated by means of top cyber threats and emerging threat trends in various technological and application areas. References to over 400 relevant sources on threats will help decision makers, security experts and interested individuals to navigate through the threat landscape.

ETL 2013

ETL 2013 is based on a comprehensive information collection of publicly available open source material. Reports of various kinds (i.e. content, context, level of detail, subject areas, etc.) are collected over the entire reporting period. These reports are parsed to identify relevant content, such as threats, threat agents and trends.

The work on the ENISA Threat Landscape has been performed as part of the ENISA Work Programme 2013 under the Work Stream “Evolving risk environment & opportunities”.

ETL 2012

The ENISA Threat Landscape 2012 provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent reports from security industry, networks of excellence, standardisation bodies and other independent institutes have been analysed.

 


We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more