Blog:

On 2026-05-18
by Rhidian Jowers
Cybersecurity

Mythos or mirage: The hidden burden of agentic security

Table mythos or mirage
The recent arrival of Claude Mythos Preview has been met with the usual industry fanfare, promising a new era of agentic security where AI finally moves from being a passive observer to an active defender. However, as we have seen with every previous iteration of machine learning in this space, unbridled enthusiasm usually precedes a [...]
  • Share

Discover all the latest releases

product security Cybersecurity

What is Product Security?

Product Security: The invisible Shield.  In the era of modern and interconnected world, Product Security acts as an unseen defense whose tangible effects are clearly observed and felt in our daily lives. While Product Security and Cybersecurity are intrinsically linked, however, they diverge in their priorities especially within the Operational Technology and Critical infrastructure. Cybersecurity, [...]

Read more
embed resilience into the DNA of all critical operations and functions Cybersecurity

It’s time to embed resilience into the DNA of all critical operations and functions

We have begun to live in a world where unpredictability is a part of daily life; where geopolitical tensions are more frequent, recovery timeframes are shorter, keeping economic balance is harder, and trajectories are switchbacked. In a competitive environment overwhelmed by transformation and restructuring, the defining requirement for organisations is no longer speed, quality, or […]

Read more
Netwars and Cyber Interview Cybersecurity

Airbus Protect shines in international cybersecurity competition

Once a year, just before the Christmas break, cybersecurity experts from around the world gather together and compete in the SANS NetWars Tournament of Champions, an invite-only cybersecurity competition featuring the top-scoring 200 players from their regional equivalents. This competition tests cybersecurity professionals across hands-on challenges in penetration testing, forensics, and threat detection. Competitors solve [...]

Read more
Safety

From QMS to SMS: The Evolution of Safety Management Systems

For any modern enterprise, particularly those operating in safety-critical domains, the ability to manage risk is not merely a box-ticking exercise; it is the bedrock of operational longevity and ethical responsibility. In the complex world of industrial and technological operations, a haphazard, reactive approach to safety is no longer sufficient. What is required is a comprehensive,[...]

Read more
International Women's Day 2026 Interview

International Women’s Day 2026

This year’s theme is 'Give To Gain', focusing on how sharing knowledge, support, and visibility can accelerate gender equality. Performance, for Airbus Protect, is about the strength of our collective intelligence."Give To Gain," perfectly captures the thought-process behind a high-performing organisation. When we foster a culture where women are empowered to "give", meaning sharing their [...]

Read more
AI and Machine Learning in security architecture: Enhancing detection, response, and automation Cybersecurity

AI and Machine Learning in security architecture: Enhancing detection, response, and automation

Artificial Intelligence (AI) and Machine Learning (ML) are often touted as the solution that promises to finally shift security from a reactive to a proactive game. However, for security teams, the reality is often a story of noisy alerts and tools that lack critical context. While the potential is considerable, harnessing it requires a pragmatic [...]

Read more