Blog:

On 2025-10-28
by Rhidian Jowers, Cybersecurity Architect at Airbus Protect
Cybersecurity

Threat Modelling for Security Architects: Identifying and Mitigating Risks Before They Happen

Cyber Security Architecture

As security architects, we’re responsible for laying the secure foundation for entire systems, encompassing software, hardware, networks, and critical processes. Our architectural decisions ripple throughout the system’s lifecycle, profoundly impacting not just performance, scalability, and maintainability, but, most importantly, the system’s inherent security. In today’s increasingly sophisticated digital landscape, building secure systems is no longer […]

  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

Airbus Protect Explains: the New EU Regulation on Batteries Sustainability

Airbus Protect Explains: the New EU Regulation on Batteries

Introduction As many states and industries undergo a widespread shift from fossil fuels to emission-free electrification, batteries are becoming a crucial storage tool to facilitate energy transition. With falling costs, advancing innovation and supportive policies, the demand for this technology (essential for achieving climate and energy targets) is only increasing, according to a recent IEA [...]

Read more
CSIRT blogpost

Incident Response: Analysis of recent version of BRC4

Introduction During our latest incident response case we have discovered a recent sample of Brute Ratel C4 packed with Themida. BRC4 is a powerful Command and Control (C2) tool which allows to control targeted workstations through an executable agent. The objective of Themida is to protect code against reverse engineering. Currently, C2 tools are used [...]

Read more
understanding digital risk management Cybersecurity

Digital Risk Management: A Business-Aligned Approach

Organisations today face a complex and evolving array of risks that require effective management. Some are inherently digital, while others are traditional risks amplified by technology. From cyberattacks to technical disruptions, these threats pose significant challenges for businesses, holding the power to impact operations, finances, reputation, and ultimately bottom line.  To safeguard their future, organisations [...]

Read more
Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBA? Cybersecurity

Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBAs?

What is Regulation 2023/2841?   The EU cybersecurity Regulation, which came into force at the start of this year, aims to establish a comprehensive and standardised approach to cybersecurity across European Union Institutions, Bodies and Agencies (EUIBA). This ensures that all entities are well-protected against evolving cyber threats and capable of executing a coordinated incident […]

Read more
Understanding the EU AI Act in 5 steps Cybersecurity

The EU AI Act has come into force! Here’s what you need to know.

After long negotiations and discussions between European institutions and bodies, the EU AI Act came into force on August 1, 2024. While Artificial Intelligence offers vast potential and commercial opportunities, the ethical implications and inherent risks of AI mean it must be used responsibly and in moderation. The EU AI Act establishes clear guidelines to […]

Read more
Cybersecurity in industrial and manufacturing environments: Understanding the fundamentals Cybersecurity

Cybersecurity in industrial and manufacturing environments: understanding the fundamentals

Introduction to OT Security Source: CEA list from DIMS event, 16th May 2024   You've probably heard of Industry 4.0 – the ongoing automation of manufacturing and industrial practices using modern technology. More industries are embracing this approach by incorporating IoT, cloud, AI and cyber-physical systems into their production chain. The resulting connectivity boosts productivity [...]

Read more