Insights

Got a question that needs to be answered? Get in touch to find out how we can support you.
Contact us

Check out the latest blogs and whitepapers from our risk management, safety, security and sustainability experts – as well as our range of case studies, videos and other resources.

CSIRT explained by Airbus Protect Cybersecurity

Digital Forensics & Incident Response: why do firemen always come too late?

Why is time management so important in Digital Forensics & Incident Response?  Digital Forensics and Incident Response (DFIR) is a very specific domain of cybersecurity where time is the enemy. Each lost minute or hour during the crisis could either imply incident escalation or lead to lose another set of logs due to bad retention […]

Read more
Everything you need to know about NIS 2 Directive Cybersecurity

The NIS 2 Directive – your questions answered

Charlotte Graire, Senior Manager of Business Growth, answers the 5 Ws around the EU’s incoming NIS 2 Directive. A new European cyber security regulation is arriving soon. The second iteration of the Directive on Security of Network and Information Systems (NIS 2) is designed to strengthen Member States’ cyber security capabilities and reduce fragmentation at […]

Read more
Digital twins with light blue background Innovation

Digital Twins in companies

Contribute to the assessment of the environmental performance of companies using digital twins for simulation and decision making. What are the challenges of adopting the taxonomy of sustainable activities at EU level? Taxonomy at EU level On April 21, 2021, the European Commission adopted a set of measures aimed at better directing capital flows towards […]

Read more

White Papers

Discover more
Cybersecurity

SOC 4.0 – Managed Security Services

Why a SOC service is needed? A Security Operations Centre (SOC) is defined as a combination of experts, tools and processes to help prevent, detect, analyse and evaluate security risks. A SOC will also coordinate and monitor the remediation of security incidents in Information and Operational Technology infrastructure.

Download
Cybersecurity

Risk and Compliance two complementary approaches

Companies face multiple risks. Knowing how to manage and take risks is part of the daily life of a CEO or an entrepreneur. Cybersecurity risks are among the most complex to manage. They prove to be systemic due to the latest digitization trends and they evolve as fast as the attackers.

Download
Cybersecurity

A security model for distributed critical systems

This document presents a security architecture model for critical, distributed systems. As a model, it is a good tool to simplify analysis on complex systems, and is useful both in assessing existing systems, where divergence from the model points to probable security issues, and building new systems, where fitting in the model guarantees past experience is taken into account.

Download

Resources

Learn more about Airbus Protect by downloading our brochures.

Communication kit

More on [Insights]