A method to assess 'forgivable' vs 'unforgivable' vulnerabilities
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement. Read the full article →
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement. Read the full article →
How service owners should securely provision and manage certificates in the Web PKI. Read the full article →
The NCSC has updated 3 key pieces of cryptographic guidance. Here, we explain the changes. Read the full article →
Acknowledgements Vasilis Kostakis acknowledges support from the Estonian Centre of Excellence in Energy Efficiency, ENER (grant TK230). A recent experiment by YouTuber PewDiePie surfaced something unsettling: Artificial Intelligence (AI) systems developing behaviours their creator did not anticipate. He created a "council" of multiple AI systems operating democratically. They answered questions, then voted on the best…
Background As the European Union’s digital rulebook continues to expand rapidly, EU institutions have intensified their efforts to streamline and better coordinate existing legislation – a trend reflected, most recently, in the European Commission’s proposal for a Digital Omnibus Regulation. Against this backdrop, a study commissioned by the European Parliament’s Committee on Industry, Research and…