Please turn on your JavaScript for this page to function normally.
ENISA
Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …

lock
Why pseudonymisation is important to protect personal data?

The European Union Agency for Cybersecurity (ENISA) released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity …

ENISA
35% of organizations believe the NIS Directive expectations are unclear

The European Union Agency for Cybersecurity (ENISA) released a report on information security spending for network and information services (NIS) under the NIS Directive, the …

IoT
Guide: Security measures for IoT product development

The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …

ENISA
ENISA looking for talented cybersecurity professionals

ENISA seeks to recruit a number of talented professionals from a wide range of backgrounds, to reinforce its capacity to shape Europe’s cybersecurity future. Work …

healthcare
ENISA publishes procurement guidelines for cybersecurity in hospitals

The EU Agency for Cybersecurity (ENISA) published a cybersecurity procurement guide for hospitals. The hospital is a vast ecosystem comprised of an entire network of devices, …

EU
The current landscape for supporting innovation in cybersecurity in the EU

Innovation in cybersecurity is a key enabler to facilitate progress in the NIS industry, boost employment in the cybersecurity sector and growth of EU GDP. ENISA published a …

Europe
Exploring the proper use of pseudonymisation related to personal data

In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …

EU
Insight into NIS Directive sectoral incident response capabilities

An analysis of current operational incident response (IR) set-up within the NIS Directive sectors has been released by ENISA. The NIS Directive and incident response The EU’s …

Ship
Port cybersecurity: Safeguarding operations against cyber attacks

Port stakeholders are facing more and more cybersecurity challenges with the emergence of new threats, regulations and increased digitalization. Major incidents such as …

Car
Smart car security: Good practices to improve car safety

The automotive industry is undergoing an evolution towards connected and autonomous vehicles. Increasingly smart cars include added features that enhance users’ experience or …

IoT connection
Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced …

Don't miss

Cybersecurity news