{"id":1660,"date":"2006-05-31T00:00:00","date_gmt":"2006-05-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/31\/euro-security-initiatives-proposed\/"},"modified":"2021-12-30T11:39:46","modified_gmt":"2021-12-30T11:39:46","slug":"euro-security-initiatives-proposed","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/31\/euro-security-initiatives-proposed\/","title":{"rendered":"Euro Security Initiatives Proposed"},"content":{"rendered":"<p>The European Commission today issued a report that calls for greater education on IT security, and the creation of a common framework for collecting incident data.  The commission calls for a cross-border effort to educate users about security and to unify disjointed national efforts to track exploits.  The EC also proposes to benchmark security-related policies and practices among its member nations, &#8220;to help identify the most effective practices so they can be deployed wherever possible on a broader basis throughout the EU.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The report calls for the EC&#8217;s European Network and Information Security Agency (ENISA) &#8220;to study the feasibility of a European information sharing and alert system to facilitate effective responses to existing and emerging threats to electronic networks.&#8221;   Such a system would require the creation of a multilingual EU portal to provide detailed information on threats, risks, and alerts, the commission said.<\/p>\n<p>Another proposal calls for businesses, users and government agencies to hold a &#8220;multi-stakeholder debate&#8221; on the balance between security and privacy, including the implications of RFID technology on end user privacy.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=96086&#038;WT.svl=news2_3<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1660","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1660"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1660\/revisions"}],"predecessor-version":[{"id":4147,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1660\/revisions\/4147"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}