Read the factsheets of the NCSC.
IT Security Guidelines for Transport Layer Security (TLS)
These guidelines are intended to aid during procurement, set-up and review of configurations of the Transport Layer Security protocol (TLS). TLS is the most popular protocol to secure connections on the Internet.
Factsheet TLS interception
TLS interception makes encrypted connections within the network of an organisation accessible for inspection. The use of this technical measure should be carefully considered in the light of additional risks and should meet a number of important preconditions.
Factsheet Building a SOC: start small
An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre (SOC). In order for a SOC to function successfully, it must be tied in with the business processes. This makes building a SOC a major challenge. Due to the many organizational and technical issues that come to mind when setting up a SOC, it...
Factsheet Post-quantum cryptography
The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a future quantum computer, one can decrypt data that is encrypted with popular cryptographic algorithms. The consequences are, however, even more serious. Encrypted data may already be intercepted, awaiting the possibility to decrypt the data with a...
Factsheet Choosing a messaging app for your organisation
Using publicly available messaging apps for business communication involves certain risks and has consequences for both your organisation and information sharing. This factsheet will elaborate on what kind of organisational risks exist when employees use such a publicly available messaging app.