Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

61 publications

Enter search criteria

Fill in keyword(s) to narrow your search.

Period
Period

You can select a specific type of publication you are looking for, such as press releases or speeches.

Sort by:
  1. A practical guide: Benefit more from your ISAC

    How do you want your Information Sharing and Analysis Centre (ISAC) to develop? The NCSC commissioned TNO to design an ISAC ...

    Publication | 24-02-2020

  2. Factsheet TLS interception

    TLS interception makes encrypted connections within the network of an organisation accessible for inspection. The use of this ...

    Factsheet | 12-02-2020

  3. Flowchart Citrix vulnerability

    This flowchart could assist in making a risk assesment concerning the Citrix vulnerability.

    Publication | 21-01-2020

  4. Factsheet DNS monitoring will get harder

    New DNS transport protocols make it harder to monitor or modify DNS requests. This is beneficial on today’s untrusted networks. ...

    Factsheet | 02-10-2019

  5. Cyber Security Assessment Netherlands 2019

    Publication | 13-09-2019

  6. Infographic Cyber Security Assessment Netherlands 2019

    Publication | 13-09-2019

  7. ENISA Newsletter

    Newsletter | 11-09-2019

  8. National Detection Network

    Video | 01-07-2019

  9. IT Security Guidelines for Transport Layer Security (TLS) v2.0

    These guidelines are intended to aid during procurement, set-up and review of configurations of the Transport Layer Security ...

    Publication | 23-05-2019

  10. Operational Framework and RFC2350

    Publication | 21-03-2019