- VRI will complete the current research efforts on NCSC’s vulnerability
- He will be responsible for communicating the needs of the NCSC with external experts
- The objective is to understand defects, patches and research methodology
The National Cyber Security Center (NCSC) of the United Kingdom has announced the training of the Vulnerability Research Initiative (VRI), a new program that will see its partnership with third-party cybersecurity experts for research on vulnerability in goods and specialized technology.
The NCSC has said that it is currently operating a team of internal researchers who are experts in common technologies and who research vulnerability (VR) on a range of technologies and products, traditional goods technology, with specialized solutions used only in a few places.
However, the team is unable to follow the speed at which the technological industry changes. New Tech appears every day, and Old Tech evolves beyond recognition, “and therefore VR becomes more difficult”.
Understand vulnerabilities
“This means that the NCSC demand for virtual reality continues to grow,” said the NCSC.
To take up the challenge, he decided to create VRIs and create third -party help. The objective of the program is to help NCSC researchers understand the vulnerabilities present in today’s technologies, the necessary attenuations, the way experts conduct their research and the tools they use in the process.
“This successful way of working increases the ability of the NCSC to make virtual reality and shares VR expertise through the VR ecosystem of the United Kingdom,” the press release said.
The VRI Core team will include technical experts, relations managers and project managers, the basic team being responsible for the communication of the VR team requirements to the VRI industry partners and the supervision of progress and research results.
In the (close) future, the NCSC will bring more experts to combat vulnerabilities linked to AI or otherwise. Those who are interested in participating in the VRI should contact the agency by e-mail at [email protected]. The address should not be used to share vulnerability reports.
Via Bleeping Compompute