To outsiders, the security operations centre (SOC) can seem like an impenetrable black box. To lift the lid on what really goes on inside Airbus Protect’s SOC, we interviewed Pauline and Valentin, two of our analysts.Read more
Annual Review for Germany: Cyber Defence at Airbus Protect Reaches New Level in 2023
In 2023, Airbus Protect demonstrated unparalleled achievements in cyber defence, marking a significant milestone for the company. Four key events in Germany contribute to the organisation's commitment to excellence and innovation in the ever-evolving landscape of cybersecurity.
Four key events in Germany contribute to the organisation's commitment to excellence and innovation in the ever-evolving landscape of cybersecurity.
Testimonials & InterviewsDiscover more
Ibriza Jouini joined Airbus Protect in Toulouse back in November, 2022. In this interview, she explains what the job of an Industrial Risk Engineer entails and offers valuable advice to women aspiring to work in engineering.Read more
Phillipa Phipps is a Cybersecurity Consultant at Airbus Protect. She didn’t take the traditional route into a cybersecurity career. But that just makes her journey more interesting! Find out more in this interview.Read more
Discover all the latest releases
Want to learn more about day-to-day work of an avionics engineer? Meet Nicolas, a module integration architect at Airbus Protect’s Toulouse site.Read more
Ever wondered what it takes to become an incident responder? We asked Chaïma, an incident responder based in our Paris office, to tell us about her career trajectory so far.Read more
Find out how to use CTI as an Operational Support (part 1) Introduction to Cyber Threat Intelligence Cyber Threat Intelligence is a discipline of Intelligence applied to the cyber field. According to Kent’s Analytic Doctrine, the role of (Cyber) Intelligence Analysts is to provide “information and insights to policy decision-makers and action-takers”. In the context […]Read more
For Star Wars Day, we invited employees of Airbus Protect to invent a new and sustainable mode of transportation in the Star Wars Universe. Here are the winning answers from our contest: ANSWER 1: 3 options for all types of travel by Leo Picou I’ll start by splitting the type of trip into three categories […]Read more
MDR, SOC, EDR, XDR, SOAR and SIEM, what does it all mean? In cyber-security, we’re notorious for using an abundance of two, three and even four-word acronyms. If you’re new to the space, these can be confusing, to say the least. To make things a little easier, we’ve created this guide! It explains some of […]Read more
Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration This first part explains [...]Read more