admin

December 8, 2025

A method to assess 'forgivable' vs 'unforgivable' vulnerabilities

Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.
December 8, 2025

Provisioning and managing certificates in the Web PKI

How service owners should securely provision and manage certificates in the Web PKI.
December 8, 2025

Updating our guidance on security certificates, TLS and IPsec

The NCSC has updated 3 key pieces of cryptographic guidance. Here, we explain the changes.
December 8, 2025

AI as commons: Why we need community-controlled Artificial Intelligence

AI as commons: Why we need community-controlled Artificial Intelligence Vasilis Kostakis, Tallinn University of Technology (TalTech), Estonia Aristotle Tympas, National and Kapodistrian University of Athens, Greece […]
December 5, 2025

Two pillars, one ecosystem: the AI Act–DSA interplay in EU digital governance

Background As the European Union’s digital rulebook continues to expand rapidly, EU institutions have intensified their efforts to streamline and better coordinate existing legislation – a […]
December 4, 2025

EVENT ALERT | DATA MARKETS IN EUROPE: NEW TRAJECTORIES IN LAW, TECHNOLOGY, AND GOVERNANCE

MediaLaws is pleased to share a two-day workshop “DATA MARKETS IN EUROPE: NEW TRAJECTORIES IN LAW, TECHNOLOGY, AND GOVERNANCE”, taking place on 8-9 December 2025 at […]
December 3, 2025

Building trust in the digital age: a collaborative approach to content provenance technologies

Joint NCSC and Canadian Centre for Cyber Security primer helps organisations understand emerging technologies that can help maintain trust in their public-facing information.
December 2, 2025

È ancora possibile fare pubblicità politica?

Questo blog post è già stato pubblicato sul sito di DGRS – Untraditional Lawyers, al seguente link: Trasparenza e targeting della pubblicità politica: le novità introdotte […]
December 2, 2025

What makes a responsible cyber actor: introducing the Pall Mall industry consultation on good practice

Calling vulnerability researchers, exploit developers and others in the offensive cyber industry to share their views.