Publications
You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.
80 publications
- Date
- Relevance
-
Software Bill of Materials Starter Guide
A Software Bill of Materials (SBOM) is an important building block in improving the transparency of a software supply chain and ...
-
SOC of the future
Security monitoring and incident response will face major challenges in the coming years, as the complexity of infrastructures, ...
-
Factsheet Managing edge devices
-
The future of cyber attacks with Large Language Models
TNO and NCSC have conducted an exploration to try to identify how the impact of Large Language Models (LLMs), underlying ...
-
Threat modeling in Dutch organizations
Many products consist largely of software. Think, for example, of your smartphone, your robot vacuum cleaner, banking ...
-
Security by Behavioural Design: A Feasibility Study
To improve end-user behaviour, many organisations turn to awareness campaigns or training initiatives. The first uses posters, ...
-
Make your organization quantum secure
Quantum computers will have sufficient computing power to break many of the most commonly used forms of cryptography between 2030 ...
-
Managing Insider Threats
Insiders can pose a significant risk to your organization. The impact of an insider threat can be devastating. Unlike ...
-
The need for a Cyber Security Information System
The Network and Information Security 2 Directive (NIS2) was officially published in the EU Official Journal on December 27th, ...
-
Factsheet protect domains against phishing