Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

90 publications

Enter search criteria
Fill in keyword(s) to narrow your search.
Period
You can select a specific type of publication you are looking for, such as press releases or speeches.
Sort by:
  1. Forensic readiness

    It is vital to conduct an investigation after a cyber attack. There are many possible scenarios in which the extent to which your ...

    Publication | 27-06-2025

  2. How do I map my critical assets?

    This publication provides practical starting points you can use to map your organisation’s ‘critical assets’. Once you have ...

    Publication | 27-06-2025

  3. Five basic principles of digital resilience

    Digital resilience is vital if your organisation wants to benefit optimally from the opportunities and possibilities of ...

    Publication | 26-06-2025

  4. Procuring cyber security services

    Doing it yourself or outsourcing in cyber security is a hotly debated topic in every organisation. Important questions in this ...

    Publication | 26-06-2025

  5. Exposure management

    If you want to protect your organisation against digital threats, you need to know the extent to which your networks and systems ...

    Publication | 26-06-2025

  6. Security guidelines for Transport Layer Security 2025-05

    This publication offers recommendations on how to set up a TLS configuration that protects your application in an appropriate ...

    Publication | 26-06-2025

  7. Beyond elearning

    Our aim in this publication is to offer you guiding principles to help you promote cyber-secure behaviour among the employees in ...

    Publication | 28-02-2025

  8. PGP-Key

    Publication | 06-01-2025

  9. Risk management roadmap

    This is the English version of the visualization of the risk management roadmap.  The risk management roadmap has been drawn up ...

    Publication | 04-10-2024

  10. Recover from a cyber incident

    Mailservers are offline. Important data can no longer be accessed. To make matters worse, the backups are also encrypted. It is ...

    Publication | 30-09-2024