• Looking into the crystal ball: A report on emerging technologies and security challenges

    The time has come for ENISA to take a look at the crystal ball of technology; In particular looking at what are considered to be emerging technologies and what might be their prospective usage scenarios. Considering emerging technologies and...

    Published on January 31, 2018
  • ENISA Threat Landscape Report 2017

    2017 was the year in which incidents in the cyberthreat landscape have led to the definitive recognition of some omnipresent facts. We have gained unwavering evidence regarding monetization methods, attacks to democracies, cyber-war, transformation...

    Published on January 15, 2018
  • Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide

    The ad-hoc and sensor networking Threat Landscape and Good Practice Guide complements the Annual Cyber Security ENISA Threat Landscape (ETL). It provides a deep overview of the current state of security in the ad-hoc and sensor networking for M2M...

    Published on February 08, 2017
  • Hardware Threat Landscape and Good Practice Guide

    The goal of this report is the compilation of a comprehensive landscape of hardware-related assets, threats, and good practices. This landscape provides basic information for manufacturers and developers who want to understand which threats their...

    Published on February 08, 2017
  • ENISA Threat Landscape Report 2016

    The ENISA Threat Landscape 2016 - the summary of the most prevalent cyber-threats – is sobering: everybody is exposed to cyber-threats, with the main motive being monetization. The year 2016 is thus characterized by “the efficiency of...

    Published on February 08, 2017
  • Big Data Threat Landscape

    This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents...

    Published on January 27, 2016
  • Threat Landscape and Good Practice Guide for Software Defined Networks/5G

    This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by...

    Published on January 27, 2016
  • ENISA Threat Landscape 2015

    This report, the ENISA Threat Landscape 2015 (ETL 2015), is the result of an analysis of cyber-threats that have been encountered in the last 12 months, that is, approximately between December 2014 and December 2015. ETL 2015 is the fourth in a...

    Published on January 27, 2016
  • Threat Landscape for Smart Home and Media Convergence

    The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic...

    Published on February 09, 2015
  • ENISA Threat Landscape 2014

    In the ETL 2014, details of the developments made in 2014 are consolidated by means of top cyber threats and emerging threat trends in various technological and application areas. References to over 400 relevant sources on threats will help decision...

    Published on January 27, 2015
  • Threat Landscape of Internet Infrastructure

    This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources...

    Published on January 15, 2015
  • Smart Grid Threat Landscape and Good Practice Guide

    ENISA report on threats in the area of smart grids and good practice guide.

    Published on December 17, 2013
  • ENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats

    ENISA releases the 2013's ENISA Threat Landscape (ETL 2013). The ENISA Threat Landscape is a collection of top cyber-threats that have been assessed in the reporting period, ie. end 2012-end 2013. ENISA has collected over 250 reports regarding...

    Published on December 11, 2013
  • ENISA Threat Landscape mid year 2013

    ENISA presents in this short paper a first “taste” of current developments related to the Threat Landscape 2013.

    Published on September 19, 2013
  • ENISA Threat Landscape 2012

    The ENISA Threat Landscape provides an overview of threats, together with current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 140 recent...

    Published on January 08, 2013
  • Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices

    This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies...

    Published on December 19, 2012
  • Consumerization of IT: Top Risks and Opportunities

    This report is an ENISA deliverable in the area of “Identifying & Responding to the Evolving Threat Environment”. It delivers the results of a risk and opportunity assessment in the area of “Consumerization of IT” (COIT), that is, the recent...

    Published on October 18, 2012
  • Smartphones: Information security risks, opportunities and recommendations for users

    The objective of this report is to allow an informed assessment of the information security and privacy risks of using smartphones. Most importantly, we make practical recommendations on how to address these risks. We assess and rank the most...

    Published on December 10, 2010
  • Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II

    This is Annex II - "Risk Assessment Spreadsheet" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".

    Published on April 12, 2010
  • Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex I

    This is Annex I - " Scenario Building & Analysis" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".

    Published on April 12, 2010

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information