You will find all of the English-language publications here. To search for a publication, you can use the filters. Our policy is only to show publications whose content or philosophy is still current and valid. Should you have any doubts about the shelf life of specific knowledge and information, we would like to point out that apparently outdated systems, hardware and software are still being actively used.
IT Security Guidelines for Mobile Apps
The IT Security Guidelines for Mobile Apps of the National Cyber Security Centre of the Netherlands (NCSC-NL) help develop, ...
The NCSRA III describes the research challenges in cybersecurity and privacy around five pillars: Design, Defence, Attacks, ...
National Cybersecurity Agenda
The Netherlands is in an outstanding position to capitalize on the economic and social opportunities of digitalisation. At the ...
Factsheet Building a SOC: start small
An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre ...
Factsheet Choosing a messaging app for your organisation
Using publicly available messaging apps for business communication involves certain risks and has consequences for both your ...
Factsheet Indicators of Compromise
In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. ...
Factsheet Secure the connections of mail servers
Traditionally, connections between mail servers have hardly been secured. STARTTLS is an extension to provide existing protocols ...
RFC2350 is een internationale standaard voor Computer Security Incident Response Teams. Deze standaard beschrijft hoe en waarvoor ...
Factsheet Use virtualisation wisely
Virtualisation of ICT services ensures more efficient and flexible use of hardware. This factsheet is about specific risks that ...