Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
ENISA
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
The European Cybersecurity Skills Framework (ECSF) aims to establish a comprehensive structure for defining roles, responsibilities,...
ENISA
REMOTE IDPROOFING GOOD PRACTICES
The purpose of this study is to build upon previous ENISA studies on RIDP and focus...
ENISA
Baseline Security Recommendations for IoT
In the context of Critical Information Infrastructures The Internet of Things (IoT) is a growing paradigm...
ENISA
Remote ID Proofing Good Practices
Durante la última década, se está observando una transformación digital cada vez más acelerada, que ha...
ENISA
Best Practices for Cyber Crisis Management
Prevention phase Promote the creation of national prevention programmes. Develop information security standards specific to the...
ENISA
Artificial Intelligence and Cybersecurity Research 2023
Artificial Intelligence (AI) is a typical dual-use technology, where malicious actors and innovators are constantly trying...
ENISA
Artificial Intelligence and Cybersecurity Research 2023
Artificial Intelligence (AI) is a typical dual-use technology, where malicious actors and innovators are constantly trying...
ENISA
BEST PRACTICES FOR CYBER CRISIS MANAGEMENT
The document outlines the importance of developing a comprehensive framework for managing cyber crises at both...
ENISA
ENISA – PANORAMA DE AMENAZAS DOS
Denial-of-Service (DoS) attacks have been a constant security concern for organisations. However, in the last few...
ENISA
ENISA THREAT LANDSCAPE 2023
The ENISA Threat Landscape (ETL) report, now in its eleventh edition, plays a crucial role in...
ENISA
COMPENDIUM OF RISKMANAGEMENT FRAMEWORKS WITHPOTENTIAL INTEROPERABILITY
This report presents the results of desktop research and the analysis of currently used cybersecurity Risk...
ENISA
ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACK REPORT JULY 2022
EXECUTIVE SUMMARY During the last decade ransomware has become one of the most devastating types of...
ENISA
TELECOM SECURITY INCIDENTS REPORT 2021 BY ENISA
TELECOM-SECURITY-INCIDENTS-2021Descarga
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency for Cybersecurity
INTRODUCTIONBACKGROUNDIn line with the ENISA’s European Union Agency for Cybersecurity’s sixth strategic objective,“Foresight on Emerging and...
ENISA
Cloud Cybersecurity Market Analysis by Enisa – European Union Agency for Cybersecurity
EXECUTIVE SUMMARY The present European Union Agency for Cybersecurity (ENISA) report is an analysis of the...
Latest News
The Hacker News
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now – Source:thehackernews.com
20/02/2025
The Hacker News
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
securelist.com
Managed detection and response in 2024 – Source: securelist.com
20/02/2025
CSO - Online
Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen – Source: www.csoonline.com
20/02/2025