News


Logo Blue OLEx 2019

1 July 2019

Following a French and Spanish initiative within the framework of the NIS cooperation group, 23 Member States, ENISA and the European Commission are gathering for the first time at high level in Paris on July 2 and 3, 2019 for an exercise called Blue OLEx 2019. On this occasion, Guillaume Poupard, Director General of ANSSI, and his European counterparts will deepen the voluntary cooperation at an operational level in case of cyber crisis.

OpenCTI – The open source solution for processing and sharing threat intelligence knowledge

28 June 2019

The OpenCTI project (Open Cyber Threat Intelligence) is a platform meant for processing and sharing knowledge for cyber threat intelligence purposes. It has been developed by the French national cybersecurity agency (ANSSI) along with the CERT-EU (Computer Emergency Response Team of the European Union). It was initially designed to develop and facilitate ANSSI’s interactions with its partners. Today, the platform has been fully released in open source and made available to the entire cyber threat intelligence community, in order to allow the actors to structure, store, organize, visualize and share their knowledge.

See all news

Publications


The ANSSI and the Bundesamt für Sicherheit in der Informationstechnik (bsi) present the second edition of the “Common situational picture”

21 May 2019

The “Common situational picture” (CSP) is a joint report that aims to demonstrate ANSSI’s and BSI’s willingness to improve their common communication and face together the growing challenges, which occur in a more digitalized and connected world. Following the first joint report produced in 2018, this year‘s second edition of the CSP picks up the […]

Configuration recommendations of a gnu/linux system

22 February 2019

GNU/Linux distributions are highly heterogeneou, the control of the system platform is a complex task; expertise becomes really necessary as the number of services and servers increases. However, some hardening measures can be implemented based on the expected security level, which will depend on the sensitivity of the data handled or hosted by the system […]

See all publications