searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

ENISA

Get our top stories in your inbox

All you need to know about Capture-The-Flag (CTF) competitions

May 18, 2021

ENISA released a report addressing the contemporary use of Capture-The-Flag (CTF) competitions around the world. It explores how these competitions work and provides a …

CAM sector cybersecurity challenges and how to mitigate them

May 11, 2021

ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …

Research directions in cybersecurity to support a digital strategic autonomy

April 27, 2021

Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

ENISA and CERT-EU to improve the EU cybersecurity framework

March 3, 2021

The Memorandum of Understanding (MoU), signed by ENISA and CERT-EU on 15th February, was announced on the occasion of the 13th CSIRTs Network meeting. The agreement is the …

Cybersecurity risks connected to AI in autonomous vehicles

February 17, 2021

By removing the most common cause of traffic accidents – the human driver – autonomous vehicles are expected to reduce traffic accidents and fatalities. However, they may pose …

Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership

February 15, 2021

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …

Why pseudonymisation is important to protect personal data?

February 4, 2021

The European Union Agency for Cybersecurity (ENISA) released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity …

35% of organizations believe the NIS Directive expectations are unclear

December 16, 2020

The European Union Agency for Cybersecurity (ENISA) released a report on information security spending for network and information services (NIS) under the NIS Directive, the …

Guide: Security measures for IoT product development

November 10, 2020

The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …

ENISA looking for talented cybersecurity professionals

March 20, 2020

ENISA seeks to recruit a number of talented professionals from a wide range of backgrounds, to reinforce its capacity to shape Europe’s cybersecurity future. Work …

ENISA publishes procurement guidelines for cybersecurity in hospitals

February 25, 2020

The EU Agency for Cybersecurity (ENISA) published a cybersecurity procurement guide for hospitals. The hospital is a vast ecosystem comprised of an entire network of devices, …

The current landscape for supporting innovation in cybersecurity in the EU

February 3, 2020

Innovation in cybersecurity is a key enabler to facilitate progress in the NIS industry, boost employment in the cybersecurity sector and growth of EU GDP. ENISA published a …

Posts navigation

1 2 3 4 5 6 7 … 11

Featured news

  • CISO-approved strategies for software supply chain security
  • Phishers use encrypted file attachments to steal Microsoft 365 account credentials
  • New Buhti ransomware uses leaked payloads and public exploits
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

CISO-approved strategies for software supply chain security

Phishers use encrypted file attachments to steal Microsoft 365 account credentials

New Buhti ransomware uses leaked payloads and public exploits

Strengthening travel safety protocols with ISO 31030

Phishing campaign targets ChatGPT users

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us