Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

61 publications

Enter search criteria

Fill in keyword(s) to narrow your search.

Period
Period

You can select a specific type of publication you are looking for, such as press releases or speeches.

Sort by:
  1. Ransomware incident response plan

    Ransomware can have a very disruptive effect on organisations. And what do you do then? Or how can you prepare for this? The NCSC ...

    Publication | 17-08-2022

  2. Memo Cloud Act

    Publication | 16-08-2022

  3. Factsheet Mature authentication - use of secure authentication tools

    Factsheet | 09-06-2022

  4. PKIoverheid will stop issuing web certificates: Choose another issuer

    Logius will stop issuing publicly trusted web server certificates in the PKIoverheid system. If your organisation is currently ...

    Factsheet | 04-11-2021

  5. Factsheet 'Prepare for Zero Trust'

    More and more organizations are applying Zero Trust principles, and the need for the implementation of these principles is ...

    Factsheet | 18-08-2021

  6. Guide to Cyber Security Measures

    The Guide to Cyber Security Measures lists eight measures that every organisation should take to prevent cyber-attacks. Examples ...

    Publication | 05-08-2021

  7. TNO 2021 R10245 Vraagstukken en perspectieven voor ICT SCRM – een initiële verkenning (in Dutch)

    Report | 28-04-2021

  8. Using the Software Bill of Materials for Enhancing Cybersecurity

    Modern software systems involve increasingly complex and dynamic supply chains. Lack of systemic visibility into the composition ...

    Report | 04-02-2021

  9. IT Security Guidelines for Transport Layer Security (TLS)

    These guidelines are intended to aid during procurement, set-up and review of configurations of the Transport Layer Security ...

    Whitepaper | 19-01-2021

  10. 5 recommendations for securely purchasing cloud services

    Many organisations are either considering or in the process of purchasing cloud services. Cloud services can serve as a major ...

    Factsheet | 31-12-2020