This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare […]
The purpose of the Report is to present a mapping of already identified security objectives in the NISD as well as in the GDPR with ENISA good practice guides. It aims to advise operators of essential services as well as digital service providers in their process of identifying appropriate security measures based on the provisions […]
The new whitepaper on “Cybersecurity Skills Development in the EU” focuses on the state of the cybersecurity education system and the difficulty in attracting more students to cybersecurity studies.