Read the factsheets of the NCSC.
Factsheet TLS interception
TLS interception makes encrypted connections within the network of an organisation accessible for inspection. The use of this technical measure should be carefully considered in the light of additional risks and should meet a number of important preconditions.
Factsheet Building a SOC: start small
An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre (SOC). In order for a SOC to function successfully, it must be tied in with the business processes. This makes building a SOC a major challenge. Due to the many organizational and technical issues that come to mind when setting up a SOC, it...
Factsheet Post-quantum cryptography
The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a future quantum computer, one can decrypt data that is encrypted with popular cryptographic algorithms. The consequences are, however, even more serious. Encrypted data may already be intercepted, awaiting the possibility to decrypt the data with a...
Factsheet Choosing a messaging app for your organisation
Using publicly available messaging apps for business communication involves certain risks and has consequences for both your organisation and information sharing. This factsheet will elaborate on what kind of organisational risks exist when employees use such a publicly available messaging app.
Factsheet Indicators of Compromise
In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. With IoCs, organisations can gain quick insights at central points in the network into malicious digital activities. When your organisation observes these activities, it is important to know what you can do to trace back which system is infected....