Read more about ENISA
Bookmark and Share
  • Security framework for governments deploying the cloud

    27.02.2015

    ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and implement a secure Gov Cloud.

  • How important is the critical information infrastructure?

    23.02.2015

    ENISA issued methodologies for the identification of Critical Information Infrastructure (CII) services in communication networks.

  • Certifying ICS/SCADA professionals

    18.02.2015

    An online survey and interviews with experts from EU Member States and worldwide, analyses how current initiatives on the certification of professional skills are related to the topic of ICS/SCADA cyber security.

  • Are smart homes security smart?

    09.02.2015

    A new ENISA study aims to identify both the security risks and challenges as well as the countermeasures required for emerging technologies in smart homes, providing a specific and focused approach, with an overview of the current state of cyber security in this emerging domain.

  • Guide on actionable information for security incident response

    19.01.2015

    ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security organizations encounter as they try to generate actionable output from large amounts of data.




Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //