The European Union Agency for Cybersecurity (ENISA)’s (...)
The exercise is part of the measures being implemented (...)
The European Cybersecurity Month is coordinated by the (...)
This report provides an overview of standards – (...)
This new report maps and analyses cyber incidents in (...)
33 candidates were selected ‘ad personam’, meaning on the (...)
The European Union Agency for Cybersecurity (ENISA) (...)
ENISA recently released a report on the cybersecurity (...)
ENISA’s Threat Landscape 2016 (ETL 2016) released today (...)
ENISA publishes a study on "Securing smart airports" (...)
ENISA presents a study that sets the scene on (...)
October 2016 is European Cyber Security Month and this (...)
A recent ENISA report analyses how mandatory incident (...)
ENISA Threat Landscape 2015: A consolidated overview to (...)
ENISA publishes a good practice guide on vulnerability (...)
The launch by the European Commission of a public (...)
Following extensive, multi-annual negotiations the (...)
“The challenge for policy makers is to achieve a (...)
ENISA’s Executive Director, Udo Helmbrecht, gave a (...)
ENISA’s Security Framework for Governmental Clouds (...)
ENISA issues methodologies for the identification of (...)
ENISA published the Threat Landscape and Good Practice (...)
ENISA publishes a meta-framework and an online tool to (...)
The infographic released today by the European Union (...)
With the geopolitical context giving rise to (...)
The 5G ultra-fast mobile networks, which should be (...)
On May 2017, multiple companies and organisations (...)
The use of long-range communication networks, and (...)
Following the Council meeting on 8th and 9th December (...)
The report provides an overview of the root causes of (...)
Call for enhanced cooperation among private and public (...)
In smart cities, Intelligent Public Transport (IPT) (...)
The Regulation gives to national competent authorities (...)
The potential impact of an outage in the information (...)
The European Cyber Security Month (ECSM) is an EU (...)
Limitations to a consistent regulatory framework and (...)
Cyber security for the Smart Home is essential for the (...)
ENISA’s Management Board adopted the Agency 2016 Work (...)
ENISA releases its Annual Activity Report for 2014. The (...)
ENISA’s Executive Director Udo Helmbrecht said: “Today (...)
ENISA provides a single framework addressing the (...)
ENISA has published a report providing guidelines on (...)
ENISA’s publishes a new study - looking into the (...)
A conversation with Professor Avishai Wool, CTO and Co-founder of AlgoSec, and Tsippi Dach, Director of Brand and Marketing (...)
Ward Van Laer, Senior Systems Engineer, Belgium, Netherlands and Luxembourg from NETSCOUT met at Luxembourg Security Summit, (...)
Successful cyberattacks can cause significant financial losses and harm to businesses. According to the recent findings by (...)
2023 will go down as a transitional year for cybersecurity and information technology in general. Quantum Computing is still in its infancy, and (...)
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. has published its Brand Phishing Report for Q4 (...)
Whether you work in a small/medium-sized business (SMB) or a large enterprise, technology company, finance organisation, or anything in between, (...)
Strategic planning is a big part of creating a sustainable path to success for a business. However, building strategies around the growth of (...)
In recent years, we have witnessed a rapid rise in the use of generative artificial intelligence (AI) in various industries. From creating art to (...)
As the demand for heightened security and seamless user experiences continues to grow across various sectors, advanced biometric technologies are (...)
Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)
Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)
New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 01 68
Mail: ipsimp@kr-cms.net