You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

40 publications

Enter search criteria

Fill in keyword(s) to narrow your search.

Fill in a starting date and a closing date for the period your query is about: DD-MM-YYYY

You can select a specific type of publication you are looking for, such as press releases or speeches.

Factsheet Checklist security of ICS/SCADA systems

Malicious persons and security researchers show interest in the (lack of) security of industrial control systems (ICS/SCADA ...

Factsheet | 11-05-2016

Factsheet Disable SSL 2.0 and upgrade OpenSSL

The NCSC advises to always configure TLS on the basis of the IT security guidelines for Transport Layer Security. Therefore, ...

Factsheet | 16-03-2016

Factsheet Technical measures for the continuity of online services

During a Distributed Denial-of-Service ((D)DoS) attack, online services or the supporting infrastructure is overburdened or ...

Factsheet | 14-03-2016

Factsheet Continuity of online services

During a Distributed Denial-of-Service ((D)DoS) attack, online services or the supporting infrastructure is overburdened or ...

Factsheet | 14-03-2016

Factsheet Software has an expiry date

Software vendors regularly make announcements that certain versions of software will no longer be supported after a particular ...

Factsheet | 21-09-2015

Factsheet Help! My website has been defaced

To deface a website the attacker changes the content of existing pages or adds new ones. Hundreds of websites are defaced every ...

Factsheet | 11-05-2015

Factsheet Help! My website is vulnerable to SQL injection

SQL injection is a popular and frequently used attack on websites, which attackers use to steal large volumes of (client) ...

Factsheet | 26-01-2015

Factsheet HTTPS could be a lot more secure

HTTPS is a frequently used protocol for protecting web traffic against parties setting out to eavesdrop on or manipulate the ...

Factsheet | 05-11-2014

Factsheet Office macros

There is quite a possibility that your organisation is using Microsoft Office. One of many features offered by Office is macros. ...

Factsheet | 30-01-2014

Factsheet DNS amplification

DDoS-attacks have been hitting headlines the last year. In some of these attacks, attackers use a technique called DNS ...

Factsheet | 04-10-2013