You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.

55 publications

Enter search criteria

Fill in keyword(s) to narrow your search.

Period from

Enter a start and/or end date here, using the following format: DD-MM-YYYY.

You can select a specific type of publication you are looking for, such as press releases or speeches.

Sort by: Date / Relevance

Membership guidelines

Publication | 11-12-2018

Coordinated Vulnerability Disclosure: the Guideline

The aim of Coordinated Vulnerability Disclosure (CVD) is to improve the security of IT systems by sharing knowledge about ...

Publication | 02-10-2018

IT Security Guidelines for Mobile Apps

The IT Security Guidelines for Mobile Apps of the National Cyber Security Centre of the Netherlands (NCSC-NL) help develop, ...

Publication | 05-07-2018


The NCSRA III describes the research challenges in cybersecurity and privacy around five pillars: Design, Defence, Attacks, ...

Publication | 05-06-2018

NCSA infographic

Publication | 20-04-2018

National Cybersecurity Agenda

The Netherlands is in an outstanding position to capitalize on the economic and social opportunities of digitalisation. At the ...

Publication | 20-04-2018

Factsheet Building a SOC: start small

An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre ...

Factsheet | 15-11-2017

Factsheet Post-quantum cryptography

The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a ...

Factsheet | 31-08-2017

Factsheet Choosing a messaging app for your organisation

Using publicly available messaging apps for business communication involves certain risks and has consequences for both your ...

Factsheet | 31-08-2017

Factsheet Indicators of Compromise

In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. ...

Factsheet | 01-06-2017