Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026

Automotive Ransomware Attacks Double in a Year

April 16, 2026
Facebook X (Twitter) Instagram
Thursday, April 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ENISA Seeks Top-Tier Status in CVE Program
News

ENISA Seeks Top-Tier Status in CVE Program

Team-CWDBy Team-CWDApril 15, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


ENISA, the EU’s Cybersecurity Agency, is strengthening its ties with the US-funded Common Vulnerabilities and Exposures (CVE) program, a top leader of the agency has announced.

Invited to speak at VulnCon26’s opening keynote in Scottsdale, Arizona, on April 14, Nuno Rodrigues Carvalho, head of sector for Incidents and Vulnerability Services at ENISA, revealed that the agency was currently being onboarded by the US Cybersecurity and Infrastructure Security Agency (CISA), sole sponsor of the program, to become a top-level root CVE Numbering Authority (TL-Root CNA).

Speaking to Infosecurity after the session, Carvalho said he hopes the European agency can obtain this status “in 2026 or early 2027.”

CNA, Root CNA and TL-Root CNA Explained

Only two entities currently hold TL-Root CNA status: CISA, the program’s sponsor, and MITRE, the US-funded nonprofit which runs the program.

ENISA became a CVE Numbering Authority (CNA) – an organization authorized to assign CVE IDs to vulnerabilities – in 2024.  It then became a root CNA – an organization that oversees and coordinates multiple CNAs within a specific domain or region, onboarding new CNAs and resolving disputes – in 2025.

With the TL-Root CNA status, ENISA would become a top-level authority with the responsibility to manage the entire CVE Program alongside CISA and MITRE, setting global policies and ensuring consistency across all Root CNAs and CNAs.

Speaking to Infosecurity, Johannes Kaspar Clos, a responsible disclosure and CSIRT collaboration expert who works on CNA service implantation in Carvalho’s team at ENISA, said the agency’s future expended role in the CVE program is not only aimed at more operational leverage but also enhanced power in policy and administrative decision-making.

“As a Root CNA, we have a bigger operational footprint: we will now onboard new CNAs in Europe instead of MITRE and we are now represented in the Council of Roots helping to shape and operationalize the program, deal with challenges, adopt the program’s rules accordingly and support MITRE,” he explained.

“Now, as a TL-Root CNA, we would be represented in the CVE program’s Board, where there is currently no European representatives. We want to help and support the CVE Program to blossom and grow and share our European vision.”

Read more: AI Companies to Play Bigger Role in CVE Program, Says CISA

ENISA’s Priority: Onboarding EU National CSIRTs As CNAs

The onboarding of ENISA as the third TL-Root CNA aligns with the CVE Program’s broader diversification and internationalization strategy.

Currently, the CVE Program has 502 CNAs, of which only 83 are Europe-based organizations.

Carvalho told Infosecurity that, while he would not say that Europe is “underrepresented” in the program, “there should be a bit more” European CNAs than there are.

“We know that the European market is not as big as the US market, but we’d like to have more representatives from the EU,” he added.

During his VulnCon speech, Carvalho said ENISA is already onboarding new CNAs and that the agency’s priority is to vet “all national computer emergency response teams (CERTs) and computer security incident response teams (CSIRTs) in Europe” to become CNAs.

ENISA’s Vulnerability Branch Is Hiring

Both Carvalho and Clos said that the push to get ENISA more involved in the CVE Program came from EU member-states.

Clos  added that the growing volume and complexity of reported vulnerabilities calls for more stakeholders to take part in the program, especially now that AI companies, like OpenAI and Anthropic, have launched models that promise to autonomously find and fix cybersecurity vulnerabilities at scale.

“We need to include a diverse crowd of cybersecurity practitioners, from product and nationals CERTs and CSIRTs to researchers and vulnerability finders,” Clos said.

Carvalho also explained that, while the will to get more involved in the CVE program had been an aim of ENISA for a while, the agency needed to “mature its services and team to adequately represent EU interests on the program’s Board.”

“The challenge was always in front of us but was never picked up. I guess the concerns about software vulnerabilities were not big enough until now” Clos told Infosecurity.

“We are a very small team, that’s why, to do this, we need more people to work and support, a critical mass to work on and support the CVE program in different tasks, including onboarding national CERTs and CSIRTs. And indeed, we are growing and hiring. You’ll find vacancy notices on ENISA’s website,” Carvalho added.

Additionally, both Carvalho and Clos agreed that the TL-Root CNA onboarding process is “unchartered territory” as CISA and MITRE have operated it from the inception of the program and no one has ever been granted it ever since.

“While it doesn’t’ depend solely on us, we hope ENISA can become a TL-Root CNA in 2026 or in early 2027. We will do our best for meeting this timeframe,” Carvalho concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Hidden Cost of Recurring Credential Incidents
Next Article Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
Team-CWD
  • Website

Related Posts

News

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026
News

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026
News

Automotive Ransomware Attacks Double in a Year

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Is it OK to let your children post selfies online?

February 17, 2026

What it takes to fool facial recognition

March 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.