Last 12 November 2019, ENISA, the European Union Agency for Cybersecurity, co-organised a workshop on “Pseudonymisation and relevant security techniques” with the Unabhängige Landeszentrum für Datenschutz Schleswig-Holstein (ULD), the Data Protection Authority of the German Federal State of Schleswig-Holstein. Pseudonymisation is a well-known de-identification process that has gained additional attention following the adoption of GDPR, […]
Member States publish a report on EU coordinated risk assessment of 5G networks security
The Member States, with the support of the Commission and the European Agency for Cybersecurity published on the 9th October a report on the EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks. This major step is part of the implementation of the European Commission Recommendation adopted in March 2019 to ensure a high level of […]
European Cyber Security Challenge 2019 kicks off in Bucharest
The European Cyber Security Challenge will take place between the 9th and the 11th of October 2019 in Bucarest. The annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity! The sixth edition of the European Cyber Security Challenge (ECSC) will kick off next week at the […]
New applications for cryptocurrencies and blockchains in the social economy
Originally associated with cryptocurrencies, blockchains and distributed general ledger (DLT) technology are, in fact, very versatile and can be usefully applied to the social economy. However, it is important to regulate them properly and to guide them so that they benefit everyone and allow everyone to participate, says the EESC in a new report. While […]
Pilot Projects and Preparatory Actions: Emerging Game-changers
This call (PADR-FDDT-EMERGING-03-2019), which is aimed at developing technologies to anticipate possible disturbances in the field of defence, belongs to Pilot Projects and Preparatory Actions. Scope Proposals are sought for cutting-edge high-risk/high-reward research projects that aim to demonstrate a new technological paradigm within the scope of one or more of the following sub-topics. Applicants can […]
A Europe that protects: Continued efforts needed on security priorities
The Commission is reporting on progress made towards an effective and genuine Security Union. Thanks to close cooperation between the European Parliament, the Council and the Commission, the EU has taken significant strides in this work, putting in place a number of priority legislative initiatives and implementing a wide range of non-legislative measures to support […]
H2020: Secure societies: Information and data stream management to fight against (cyber)crime and terrorism
This call (SU-FCT03-2018-2019-2020) aims to manage the flow of information and data to combat (cyber)crime and terrorism, and is part of the Secure societies – Protecting freedom and security of Europe and its citizens sub-programme of the Horizon 2020 Programme. The amount of data generated and gathered in the frame of (cyber)crime investigations increases exponentially, […]
H2020: Secure societies: Security for smart and safe cities, including for public spaces
This call (SU-INFRA02-2019) aims to strengthen the security of intelligent cities, with an emphasis on public spaces, and is part of the Secure societies- Protecting freedom and security of Europe and its citizens sub-programme of the Horizon 2020 Programme. In the cities, public spaces such as malls, open crowded gathering areas and events, and non-restricted […]
European Defence Industrial Development Programme: EDIP-AG: Software suite enabling real–time cyber defence situational awareness for military decision-making
This call for proposals is aimed at implementing the real-time detection and response to cyberthreats through the exchange of information within the EDIP Action Grant sub-programme of the Defence Industrial Development Programme. Cyber Situational Awareness (CSA) enables commanders to have a clear understanding of the threats landscape in order to manage cyber risks during the […]