Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

83 publications

Enter search criteria
Fill in keyword(s) to narrow your search.
Period
You can select a specific type of publication you are looking for, such as press releases or speeches.
Sort by:
  1. Risk management roadmap

    This is the English version of the visualization of the risk management roadmap.  The risk management roadmap has been drawn up ...

    Publication | 04-10-2024

  2. Recover from a cyber incident

    Mailservers are offline. Important data can no longer be accessed. To make matters worse, the backups are also encrypted. It is ...

    Publication | 30-09-2024

  3. Cybercheck: Beware of Supply Chain Risks

    The increasing digitalisation of Dutch society has many benefits but also comes with risks. One of these risks has been drawing ...

    Publication | 16-09-2024

  4. Software Bill of Materials Starter Guide

    A Software Bill of Materials (SBOM) is an important building block in improving the transparency of a software supply chain and ...

    Report | 30-07-2024

  5. SOC of the future

    Security monitoring and incident response will face major challenges in the coming years, as the complexity of infrastructures, ...

    Publication | 27-06-2024

  6. Factsheet Managing edge devices

    Factsheet | 10-06-2024 | NCSC

  7. The future of cyber attacks with Large Language Models

    TNO and NCSC have conducted an exploration to try to identify how the impact of Large Language Models (LLMs), underlying ...

    Publication | 21-05-2024

  8. Threat modeling in Dutch organizations

    Many products consist largely of software. Think, for example, of your smartphone, your robot vacuum cleaner, banking ...

    Publication | 07-05-2024

  9. Security by Behavioural Design: A Feasibility Study

    To improve end-user behaviour, many organisations turn to awareness campaigns or training initiatives. The first uses posters, ...

    Publication | 09-04-2024

  10. Make your organization quantum secure

    Quantum computers will have sufficient computing power to break many of the most commonly used forms of cryptography between 2030 ...

    Publication | 25-03-2024