The tool is designed to provide guidance on best practices for securing Internet of Things (IoT) and smart infrastructures, particularly focusing on smartphone security measures.
This report dives deep into exploring various instances of personal data sharing, particularly in the healthcare industry, and reveals the best approaches to secure the protection of such information. Authors start by acknowledging the challenges in safeguarding privacy while sharing data, then move on to uncovering how to intelligently engineer technology and techniques to make […]
This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare […]
The purpose of the Report is to present a mapping of already identified security objectives in the NISD as well as in the GDPR with ENISA good practice guides. It aims to advise operators of essential services as well as digital service providers in their process of identifying appropriate security measures based on the provisions […]