Blog:

On 2024-04-11
Cybersecurity

Airbus Protect explains: Supply Chain attacks and how to fight them

Supply chain attacks and how to fight them

Supply Chain attacks are an underestimated risk for companies, where cyber threat actors can hack into a software vendor’s network, posing a significant danger to many companies. Who may be affected by these attacks? Every company of every branch who is in a business relationship to a third-party vendor who offers services or software to […]

  • Share

Testimonials & Interviews

Discover more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, Recruitment Business Partner who explain our program to hire neurodivergent people.   Elisabeth Lagarrigue: Inclusion & Diversity representative What are your responsibilities at Airbus Protect? I work on a lot of human resources projects and I am the inclusion and diversity representative for Airbus Protect.  To understand [...] Read more
3 questions, 2 experts : SOC Edition Cybersecurity

3 questions, 2 experts: SOC analyst edition

To outsiders, the security operations centre (SOC) can seem like an impenetrable black box. To lift the lid on what really goes on inside Airbus Protect’s SOC, we interviewed Pauline and Valentin, two of our analysts.

Read more

Discover all the latest releases

Pentest and incident reponse interview Cybersecurity

Cyber insights: Pentest and Incident Response

Today, we asked Felix, Penetration Tester and Philipp, Cyber Security Incident Responder, to talk about their job and how they interact in their day-to-day jobs.

Read more
cyber attack screen Cybersecurity

Planning for the Inevitable: How to Master Your Incident Response

To effectively cope with security breaches, organisations must stand prepared with a reliable plan of action to take back their power and outmanoeuvre ruthless threat actors. But how do you master the art of incident response to ensure your organisation is battle-ready in the face of imminent cyber threats?

Read more