Useful Links from Lighthouse:
Security Standards
A page with links to various cybersecurity and privacy standards.
Critical Security Updates
Practical information about recent vulnerabilities with a high and above CVSS score.
CISA Known Exploited Vulnerabilities Catalog
The CISA Known Exploited Vulnerabilities Catalog is a vital resource for promptly addressing actively exploited vulnerabilities in both federal agencies and the private sector. It is strongly recommended to review and remedy vulnerabilities listed in the catalog to mitigate the risk of compromise by known threat actors.
CISA Alerts and Advisories
Link to CISA's brief alerts and comprehensive advisories that help organisations guard against cybersecurity threats.
US National Vulnerability Database
The National Vulnerability Database (NVD) is a U.S. government repository supporting the automation for vulnerability management. It provides databases on security references, software flaws utilising Common Vulnerability Scoring System (CVSS) to assess vulnerabilities based on metrics.
The ENISA website provides insights into EU-wide cybersecurity efforts and resources, covering the agency’s mission, tasks, and activities. It offers useful information such as pan-European Cybersecurity Exercises, National Cybersecurity Strategies, and cybersecurity certification for ICT products.
Risk/Threat Management
ENISA Threat Landscape 2023: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023
Foresite 2030 Threats: https://www.enisa.europa.eu/publications/foresight-2030-threats
Threat Landscape for Heathcare: https://www.enisa.europa.eu/publications/health-threat-landscape
Risk Management Standards: https://www.enisa.europa.eu/publications/risk-management-standards
Risk Management Frameworks: https://www.enisa.europa.eu/publications/compendium-of-risk-management-frameworks
Identity Management
Digital Identity Standards: https://www.enisa.europa.eu/publications/digital-identity-standards
Remote Identity Proofing: https://www.enisa.europa.eu/publications/remote-identity-proofing-attacks-countermeasures
Artificial Intelligence
Artificial Intelligence and Cybersecurity Research: https://www.enisa.europa.eu/publications/artificial-intelligence-and-cybersecurity-research
Cybersecurity and privacy in AI: https://www.enisa.europa.eu/publications/cybersecurity-and-privacy-in-ai-medical-imaging-diagnosis
Cybersecurity of AI and standardisation: https://www.enisa.europa.eu/publications/cybersecurity-of-ai-and-standardisation
Multilayer framework for AI cybersecurity practices: https://www.enisa.europa.eu/publications/multilayer-framework-for-good-cybersecurity-practices-for-ai
Securing Machine Learning Algorithms: https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms
Post Quantum Cryptography (PQC)
PQC Integration: https://www.enisa.europa.eu/publications/post-quantum-cryptography-integration-study
PQC Current State: https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation
Cloud Security
Cloud security market analysis: https://www.enisa.europa.eu/publications/cloud-cybersecurity-market-analysis
Cloud security for healthcare: https://www.enisa.europa.eu/publications/cloud-security-for-healthcare-services
SME
Cybersecurity for SMEs: https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-for-smes