Publications

You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

40 publications

Enter search criteria

Fill in keyword(s) to narrow your search.

Periode

Enter a start and/or end date here, using the following format: DD-MM-YYYY.

You can select a specific type of publication you are looking for, such as press releases or speeches.

Factsheet Building a SOC: start small

An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre ...

Factsheet | 15-11-2017

Factsheet TLS interception

TLS interception makes encrypted connections within the network of an organisation accessible for inspection. The use of this ...

Factsheet | 11-10-2017

Factsheet Post-quantum cryptography

The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a ...

Factsheet | 31-08-2017

Factsheet Choosing a messaging app for your organisation

Using publicly available messaging apps for business communication involves certain risks and has consequences for both your ...

Factsheet | 31-08-2017

Factsheet Indicators of Compromise

In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. ...

Factsheet | 01-06-2017

Factsheet Secure the connections of mail servers

Traditionally, connections between mail servers have hardly been secured. STARTTLS is an extension to provide existing protocols ...

Factsheet | 04-04-2017

RFC2350

RFC2350 is een internationale standaard voor Computer Security Incident Response Teams. Deze standaard beschrijft hoe en waarvoor ...

Publication | 24-01-2017

Factsheet Use virtualisation wisely

Virtualisation of ICT services ensures more efficient and flexible use of hardware. This factsheet is about specific risks that ...

Factsheet | 10-08-2016

The Flip Feng Shui attack method: question and answer

On August the 10th researchers of the Vrije Universiteit Amsterdam and the Katholieke Universteit Leuven published the Flip Feng ...

Factsheet | 10-08-2016

Factsheet Your ICS/SCADA and building management systems online

Malicious persons and security researchers show interest in the (lack of) security of industrial control systems. This relates ...

Factsheet | 06-06-2016