Publications
You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.
90 publications
- Date
- Relevance
-
Forensic readiness
It is vital to conduct an investigation after a cyber attack. There are many possible scenarios in which the extent to which your ...
-
How do I map my critical assets?
This publication provides practical starting points you can use to map your organisation’s ‘critical assets’. Once you have ...
-
Five basic principles of digital resilience
Digital resilience is vital if your organisation wants to benefit optimally from the opportunities and possibilities of ...
-
Procuring cyber security services
Doing it yourself or outsourcing in cyber security is a hotly debated topic in every organisation. Important questions in this ...
-
Exposure management
If you want to protect your organisation against digital threats, you need to know the extent to which your networks and systems ...
-
Security guidelines for Transport Layer Security 2025-05
This publication offers recommendations on how to set up a TLS configuration that protects your application in an appropriate ...
-
Beyond elearning
Our aim in this publication is to offer you guiding principles to help you promote cyber-secure behaviour among the employees in ...
-
PGP-Key
-
Risk management roadmap
This is the English version of the visualization of the risk management roadmap. The risk management roadmap has been drawn up ...
-
Recover from a cyber incident
Mailservers are offline. Important data can no longer be accessed. To make matters worse, the backups are also encrypted. It is ...