Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

77 publications

Enter search criteria
Fill in keyword(s) to narrow your search.
Period
You can select a specific type of publication you are looking for, such as press releases or speeches.
Sort by:
  1. The future of cyber attacks with Large Language Models

    TNO and NCSC have conducted an exploration to try to identify how the impact of Large Language Models (LLMs), underlying ...

    Publication | 21-05-2024

  2. Threat modeling in Dutch organizations

    Many products consist largely of software. Think, for example, of your smartphone, your robot vacuum cleaner, banking ...

    Publication | 07-05-2024

  3. Security by Behavioural Design: A Feasibility Study

    To improve end-user behaviour, many organisations turn to awareness campaigns or training initiatives. The first uses posters, ...

    Publication | 09-04-2024

  4. Make your organization quantum secure

    Quantum computers will have sufficient computing power to break many of the most commonly used forms of cryptography between 2030 ...

    Publication | 25-03-2024

  5. Managing Insider Threats

    Insiders can pose a significant risk to your organization. The impact of an insider threat can be devastating. Unlike ...

    Publication | 22-03-2024

  6. The need for a Cyber Security Information System

    The Network and Information Security 2 Directive (NIS2) was officially published in the EU Official Journal on December 27th, ...

    Publication | 22-02-2024

  7. Factsheet protect domains against phishing

    Publication | 20-02-2024

  8. PGP-key

    Publication | 02-01-2024

  9. Factsheet Post-quantum cryptography

    The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a ...

    Factsheet | 08-11-2023

  10. Nationwide Crisis Response Plan for Digital Crises

    Cyberattacks- and incidents are occurring more rapidly and the consequences are increasingly severe. What could happen if those ...

    Publication | 13-10-2023