Articles

February 9, 2026

Improving your response to vulnerability management

How to ensure the ‘organisational memory’ of past vulnerabilities is not lost.
February 6, 2026

Can you help the NCSC with the next phase of EASM research?

Organisations with experience in external attack surface management can help us shape future ACD 2.0 services.
February 6, 2026

Eradicating trivial vulnerabilities, at scale

A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.
February 6, 2026

Thanking the vulnerability research community with NCSC Challenge Coins

Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.
February 4, 2026

CALL FOR PAPERS | 19th Pan-European Conference on International Relations

MediaLaws is pleased to share the call for papers for the “19th Pan-European Conference on International Relations” organised by Iscte – University Institute of Lisbon, (1-4 […]
February 2, 2026

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

CSPM tools are big business. Could they be the answer to your cloud configuration problems?
February 2, 2026

Minors’ access to social media after the Australian ban: a comparative analysis

Protection of minors in the digital environment and fundamental rights The protection of minors in the digital environment is a multifaceted issue that may be examined […]
January 29, 2026

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

CRTFs are helping organisations to make informed, risk-based decisions on the adoption of technology products.
January 26, 2026

CALL FOR ABSTRACTS | 1st NextGen Legal Scholars Conference – 20 March 2026

MediaLaws is pleased to share a Call for Abstracts for the 1st NextGen Legal Scholars Conference (NLSC), organised by the Faculty of Law and Criminology of […]