{"id":1662,"date":"2006-06-05T00:00:00","date_gmt":"2006-06-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/05\/the-european-commission-ec-shows-leadership-on-security\/"},"modified":"2021-12-30T11:39:46","modified_gmt":"2021-12-30T11:39:46","slug":"the-european-commission-ec-shows-leadership-on-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/05\/the-european-commission-ec-shows-leadership-on-security\/","title":{"rendered":"The European Commission (EC) shows leadership on security"},"content":{"rendered":"<p>As part of a new Europe-wide IT security initiative, the European Commission (EC) is urging the public sector and industry to step up efforts to protect their equipment from attacks and to share their knowledge and experience. The European Network and Information Security Agency (Enisa) was singled out by the EC to develop a framework to collect data on security incidents and to investigate the feasibility of an online EU portal to provide threat data and security alerts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enisa executive director Andrea Pirotti said that sharing information across Europe would make all stakeholders more aware of security issues.  But Graham Titterington of analyst Ovum argued that time and budgetary constraints mean most firms would find it difficult to follow all the suggestions without support.<\/p>\n<p>http:\/\/www.itweek.co.uk\/itweek\/news\/2157515\/ec-shows-leadership-security<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1662","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1662"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1662\/revisions"}],"predecessor-version":[{"id":4149,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1662\/revisions\/4149"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}