Please turn on your JavaScript for this page to function normally.
connected car
CAM sector cybersecurity challenges and how to mitigate them

ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …

shield
Research directions in cybersecurity to support a digital strategic autonomy

Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

Door
Encryption is either secure or it’s not – there is no middle ground

The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

lock
Mobile providers exposing sensitive data to leakage and theft

Data exposure is a significant, unaddressed problem for Europe’s top mobile providers and, by extension, more than 253 million customers who sign up for their services and …

ENISA
Quantum computing and encryption: Key to achieving resilience, technological sovereignty and leadership

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, …

lock
Why pseudonymisation is important to protect personal data?

The European Union Agency for Cybersecurity (ENISA) released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity …

Emotet takedown
International law enforcement effort pulls off Emotet botnet takedown

Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. “The Emotet infrastructure essentially …

ENISA
35% of organizations believe the NIS Directive expectations are unclear

The European Union Agency for Cybersecurity (ENISA) released a report on information security spending for network and information services (NIS) under the NIS Directive, the …

VoltPillager
Researchers break Intel SGX by creating $30 device to control CPU voltage

Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …

IoT
Guide: Security measures for IoT product development

The European Union Agency for Cybersecurity (ENISA) released its Guidelines for Securing the IoT, which covers the entire IoT supply chain – hardware, software and services. …

Oracle
Most UK businesses using Oracle E-Business Suite are running old systems

The majority of UK businesses using Oracle E-Business Suite (EBS) are running on old versions of the business critical ERP system, according to a Claremont study. Of the 154 …

healthcare
Hackers breach psychotherapy center, use stolen health data to blackmail patients

News of an unusual data breach at a psychotherapy center in Finland broke over the weekend, after affected patients began receiving emails telling them to pay up or risk their …

Don't miss

Cybersecurity news