Blog:

On 2025-08-11
by Yves Rutschle
Cybersecurity

Airbus Protect explains Product Security Architecture

Product Security Architecture
When cybersecurity becomes integral to products, from aeroplanes to autonomous trains With the increasing digitisation of industrial systems, our cars, trains and even critical infrastructure depend on software and connections to function. This convergence of the physical and digital worlds makes the issue of protecting them from cyber threats more fundamental than ever. It is [...]
  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

Serie_3_questions_1 expert_Gabin_Ricouart Safety

Three questions, one expert: Gabin Ricouart, propulsion safety and certification engineer

In this series, we ask safety, sustainability and cybersecurity experts three questions about their role at Airbus Protect. Today, meet Gabin Ricouart, a former intern and propulsion safety and certification engineer based in our Toulouse office. Can you tell us more about your internship at Airbus Protect? During my internship, I worked on the particular […]

Read more
Women in stem - Project controller for service delivery Cybersecurity

Women in STEM: Heather Clayton, Project Controller for Service Delivery

Heather Clayton is a Project Controller for Service Delivery at Airbus Protect. Her role is to support and maintain UK project budgets and schedules. Here are some insights into her life at Airbus. What’s the best career lesson you’ve learned so far? Don’t be afraid to ask questions. Starting a job in cyber can be […]

Read more
3_questions_1_expert_Serie_Christan_Siemers Cybersecurity

Three questions, one expert: Christian Siemers, OT consultant (CISSP certified)

In this new series, we ask safety, sustainability and cybersecurity experts three questions to learn more about their role at Airbus Protect. First up is Christian Siemers, who’s based in our Ottobrunn office.   Could you tell us what your job as an OT consultant involves? The first half of our job as OT consultants is […]

Read more
Women in STEMs: Courtney Jones Cybersecurity

Women in STEM: Courtney Jones, First Line Security Analyst

Courtney Jones is a First Line Security Analyst at Airbus Protect. Her role is to detect and investigate threats within our UK-based SOC. Here are some insights into her life at Airbus. Can you briefly talk about your professional journey to date?  It hasn’t been a long journey so far! This position is actually my […]

Read more
smartphone computer with padlock protecting from cyber threats Cybersecurity

How to protect against ransomware – top tips for CISOs

Discover in this article some tips for CISOs to strenghten their cybersecurity What is the role of a CISO? A requirement not listed on the average CISO job description is ‘expert whack-a-mole player’ – though it would be a helpful addition. The truth is that today’s CISOs are constantly juggling competing priorities, and must become […]

Read more
Container security - a guide by Airbus Protect Cybersecurity

Container security: a beginner’s guide

What is Containerisation? Containerisation – the practice of packaging software code and dependencies into a single ‘container’– has become the backbone of modern, cloud-native app development. Used in conjunction with other technologies like microservices, serverless architectures and DevOps, containerisation enables teams to quickly build, deploy, reconfigure and scale applications to run in any computing environment.   […]

Read more