/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

uk ncsc

4 articles decelerating
Articles
4
mentions
Velocity
-50.0%
growth rate
Acceleration
-1.500
velocity change
Sources
2
publications

Coverage Timeline

2025-03-20
The Guardian 13 related

The UK NCSC urges large entities, including energy and transport providers, to introduce “post-quantum cryptography” by 2035 to protect against quantum hackers

Organisations including energy and transport firms told to guard systems against powerful new computers

2024-01-25
The Record 9 related

The UK NCSC's all-source intelligence assessment: ransomware attacks will almost certainly increase in both volume and impact over the next two years due to AI

2024-01-24
The Record 15 related

The UK NCSC releases an all-source intel assessment warning that ransomware attacks will increase in both volume and impact over the next two years due to AI

Ransomware attacks will increase in both volume and impact over the next two years due to artificial intelligence (AI) technologies, British intelligence has warned.

2021-07-02
The Record 16 related

NSA, FBI, and others say Russian hacking group Fancy Bear has been using Kubernetes to run brute force attacks on US and foreign organizations since mid-2019

essentially, trying different passwords until the attackers gained access — and then use other known software vulnerabilities to steal emails, compromise other accounts and collect more data. Tonya Ri...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...