Cybershare Conference to share experience on cybersecurity.
ICT security
Last update: 08/03/2019
Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation regardless of time or place. The service provides mandates for all possible business cases and scenarios and their use cases, depending on which services the mandate is being used for. Different scenarios include: person to person mandates, person to company/organisation mandates, company/organisation to person mandates and company/organisation to company/organisation mandates. The service consists…
Open Source Software
Last update: 11/01/2017
ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically “signing and submitting” represents a legal signature and ensures that the communications and transactions between customers and Revenue cannot be repudiated at a later stage. Developed on a PKI infrastructure, this security underpins all electronic activity for Business Users. 5.3 million Revenue Returns were processed through this channel over the course of 2015, and Ireland is considered as 1st in…
ICT security
Last update: 07/12/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI infrastructure uniquely binds public keys with respective user identities by means of a certificate authority (CA) trusting digital identities through the registration and issuance process. Depending on the assurance level of the binding, this may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA) that ensures the…
ICT security
Last update: 02/10/2017
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and tests it through two scenarios representing a large number of options related to ID Management and Secure Data Transfer: 1) a scenario that involves public and private organizations and legal requirements for exchange of sensitive information; 2) a scenario that involves worldwide citizen and their requirement to exchange personal information. A third Scenario is envisaged to involve public and…
ICT security
Last update: 20/02/2024
X-Road Data Exchange Layer
X-Road is an OSS (under MIT) for secure data exchange. In particular, it enables digital signature and encryption. Governed by NIIS, founded by Finland and Estonia. It is a NIIS solution.
ICT security
Last update: 02/10/2017
CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between two parties, specifying an ebMS trading agreement between trading partners. The following information will typically be contained in a CPA document: - Identification information: the unique identifiers for each party and their roles within the trading relationship - Security information: for instance, are digital signatures required, and what algorithms do they use - Communication information: the…
ICT security
Last update: 21/08/2015
Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for free. You can use verinice for: establishing, maintaining and improving an ISMS based on ISO 27001 assuring the compliance with standards such as ISO 27002, BSI IT-Baseline Security, VDA IS-Assessments and many more performing risk analysis based on ISO 27005 auditing, document management, report generation and much more verinice runs on Windows, Linux and Mac OS. For more information…
ICT security
Last update: 20/03/2024
New responsibilities for platforms and empowered users
The EU's Digital Services Act (DSA) is now operational, impacting most online platforms in its quest to increase online safety. The DSA introduces measures to combat illegal content, requiring platforms to empower users by allowing them to flag such content. Protection for minors is emphasised, with a specific ban on targeted ads based on profiling or personal data. Users will gain more transparency about the ads they encounter, and platforms are obligated to publish annual reports detailing their content moderation procedures. Notably, small enterprises meeting certain criteria are exempted…
Digital-ready policymakingeGovernment
Last update: 20/03/2024
Cybersecurity as a tool to make Europe safer
"In a highly dynamic cybersecurity threat landscape, we are making strides to raise our collective cyber resilience. Today, we launch a new framework to ensure that the products that we use in some of the most sensitive environments, like routers and ID cards, are cybersecure. We want our citizens, businesses, and the public sector to be able to trust the products they rely upon for securing their networks and for providing sensitive public services."Thierry Breton, Commissioner for Internal Market The Commission has adopted the first-ever European cybersecurity certification scheme, in line…
ICT security
Last update: 15/01/2024
EU Commits €760M to digital transition and cybersecurity
The Commission has adopted the amendment of the Digital Europe work programmes for 2024, assigning €762.7 million in funding for digital solutions to benefit citizens, public administrations, and businesses.€549 million will focus on deploying projects that use digital technologies such as data, cloud, and advanced digital skills. The work programme will roll out support for the smooth implementation of Digital Decade multi-country projects including opportunities for European Digital Infrastructure Consortia (EDICs). New actions will support the implementation of the AI Act and the…
ICT security
Last update: 22/12/2023
ECSC 2023: German Victory
Germany emerged victorious in the prestigious 2023 European Cybersecurity Challenge (ECSC), closely followed by Switzerland and Denmark in second and third places, respectively. This year’s ECSC featured 34 teams from EU Member States and EFTA countries, including guest teams from Canada, Georgia, Serbia, Costa Rica, Singapore, and the USA, with Latvia participating as an observer. The challenge, coordinated by ENISA, is an annual event aimed at encouraging young individuals to pursue careers in cybersecurity by engaging them in various security-related tasks. The 2023 edition, organised by…