Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

NCSC sets up Vulnerability Research Initiative | Computer Weekly

By Computer Weekly by By Computer Weekly
July 15, 2025
Home Uncategorized
Share on FacebookShare on Twitter


The UK’s National Cyber Security Centre (NCSC) has lifted the lid on a Vulnerability Research Initiative (VRI) programme designed to engage the private sector on vulnerability research and discovery for the benefit of wider society.

The NCSC already runs a team of internal research experts who spend their days probing a wide range of technologies and products – anything from ubiquitous commodity tech used by consumers, to specialised operational devices used in only a few places.

This in-house capability has made the cyber agency much better informed about the security of commonly deployed technology – and how hard it can be to find vulnerabilities in software products – and helps inform down-the-line advice, guidance and risk mitigations, as well as responses to major disclosure incidents such as Citrix Bleed or Log4Shell.

However, this is a lengthy and involved process, and as the pace of technology development continues to ramp up both in complexity and volume, demand for vulnerability research is soaring.

Enter the VRI, a scheme through which the NCSC will work with external cyber  researchers and ethical hackers to expand access to the tools and tradecraft available for vulnerability discovery, and enhance understanding of the security of the technology that daily life in the UK depends on.

Among other things, the VRI aims to try to better understand the vulnerabilities present in a technology or product, what mitigations might be needed to fix them, how researchers go about conducting their research, and the tooling they use to enable it. The NCSC said this would increase its own vulnerability research capacity and share expertise across the wider ecosystem.

Ultimately, the programme’s output will be used to inform future advice and guidance delivered by the NCSC as the UK’s national technical authority on cyber security, to better engage with the supplier community to encourage them to build more secure products in the first place and to fix bugs in existing ones.

Immersive senior director of cyber threat research, Kev Breen, welcomed the NCSC’s decision to try to extend its vulnerability research capabilities: “There is a great deal of capability in the public domain, especially in more niche areas of research. It is not practical for the NCSC to maintain the necessary skills, time and resources to effectively hunt for bugs across all of these domains. Extending the VRI to include the wider community, via invitation or application, is an excellent way to broaden that knowledge base.”

Incentivising researchers

Breen noted, however, that the lack of any associated bug bounties may limit the number of individuals willing to participate in the programme when they could be compensated for conducting similar work through existing schemes.

Kevin Robertson, chief technology officer at Acumen Cyber, agreed: “Cyber is often described as a community sport. However, independent researchers typically have little incentive to collaborate with bodies like the NCSC, as they stand to gain far more recognition and impact by publishing their findings themselves, rather than handing them over to a government agency. It is essential that this does not become yet another example of wasted potential in a field where independent action often proves more meaningful.”

The NCSC said that it was keen to hear from experts in several topics – particularly the potential application of artificial intelligence (AI) to vulnerability research – and is encouraging them to get in touch. More details of the programme, including information on the overarching equities process that governs how newly found vulnerabilities are handled and disclosed, and by whom, are available here.



Source link

By Computer Weekly

By Computer Weekly

Next Post
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Recommended.

2025 Partner Program Guide: 5-Star Stellar Startup Programs

2025 Partner Program Guide: 5-Star Stellar Startup Programs

March 27, 2025
Vero Fiber Completes Acquisition of BendTel, Inc.

Vero Fiber Completes Acquisition of BendTel, Inc.

December 2, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio