Blog:

On 2026-03-20
Safety

From QMS to SMS: The Evolution of Safety Management Systems

For any modern enterprise, particularly those operating in safety-critical domains, the ability to manage risk is not merely a box-ticking exercise; it is the bedrock of operational longevity and ethical responsibility. In the complex world of industrial and technological operations, a haphazard, reactive approach to safety is no longer sufficient.

What is required is a comprehensive, structured, and proactive framework: the Safety Management System (SMS).

  • Share

Discover all the latest releases

How to ensure hydrogen safety? Hydrogen

Airbus Protect explains: How can we ensure hydrogen safety and security?

You’ve heard a lot of hype around hydrogen as an emerging energy source. But do you know how companies like Airbus Protect are working to mitigate safety and security risks in this sector? Pierre Sécher explains.  Europe’s hydrogen sector is developing fast. Largescale production will soon become a reality and new use cases are being […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat – Part 2

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration  This first part explains […]

Read more
Airbus Protect explains: Digital Risk Protection Cybersecurity

What is Digital Risk Protection? Airbus Protect explains

The pace of digital transformation continues to accelerate, with public and private sector organisations embracing cloud, automation and even artificial intelligence. But once you go ‘all digital’, how can you protect your assets? Gareth Davies, CTI and Vulnerability Lead at Airbus Protect, explains why digital risk protection should be on your organisation’s radar. When organisations […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat

Using AD DACL backdoors as a detection primitive for AD enumeration Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short [...]

Read more
A woman BID manager working in front of her laptop Cybersecurity

Women in STEM: Cari Westacott, bid manager

Cari Westacott is a bid manager. Specialising in cybersecurity consulting and managed services projects, she’s responsible for creating and overseeing Airbus Protect’s new business proposals for clients in all sectors. Read on to learn more about her role, and how to apply for bid manager jobs at Airbus Protect. Can you briefly talk about your […]

Read more