Blog:

On 2026-05-12
by Wadzani Jabani Dagala, Cyber Security Consultant
Cybersecurity

What is Product Security?

product security
Product Security: The invisible Shield.  In the era of modern and interconnected world, Product Security acts as an unseen defense whose tangible effects are clearly observed and felt in our daily lives. While Product Security and Cybersecurity are intrinsically linked, however, they diverge in their priorities especially within the Operational Technology and Critical infrastructure. Cybersecurity, [...]
  • Share

Discover all the latest releases

CSR Best Practices Sustainability

What are the Best Practices to Build Your CSR Strategy? 

In today's economic landscape, corporate social responsibility (CSR) has become an integral part of every organisation's strategy. A well-defined CSR strategy not only makes a positive contribution to society, but also enhances a company's brand.

Read more
Ship on the ocean Cybersecurity

What is Export Control? A Well-Kept Recipe!

Are you sure that you are authorised to sell your products to foreign companies and to domestic ones established in foreign countries? Have you checked whether all the components and subsystems of your product can be exported ? Are you certain that you are allowed to share technical information with your foreign interlocutor ? Having[...]

Read more
Airbus Protect Explains: the New EU Regulation on Batteries Sustainability

Airbus Protect Explains: the New EU Regulation on Batteries

Introduction As many states and industries undergo a widespread shift from fossil fuels to emission-free electrification, batteries are becoming a crucial storage tool to facilitate energy transition. With falling costs, advancing innovation and supportive policies, the demand for this technology (essential for achieving climate and energy targets) is only increasing, according to a recent IEA [...]

Read more
CSIRT blogpost

Incident Response: Analysis of recent version of BRC4

Introduction During our latest incident response case we have discovered a recent sample of Brute Ratel C4 packed with Themida. BRC4 is a powerful Command and Control (C2) tool which allows to control targeted workstations through an executable agent. The objective of Themida is to protect code against reverse engineering. Currently, C2 tools are used [...]

Read more
understanding digital risk management Cybersecurity

Digital Risk Management: A Business-Aligned Approach

Organisations today face a complex and evolving array of risks that require effective management. Some are inherently digital, while others are traditional risks amplified by technology. From cyberattacks to technical disruptions, these threats pose significant challenges for businesses, holding the power to impact operations, finances, reputation, and ultimately bottom line.  To safeguard their future, organisations [...]

Read more
Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBA? Cybersecurity

Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBAs?

What is Regulation 2023/2841?   The EU cybersecurity Regulation, which came into force at the start of this year, aims to establish a comprehensive and standardised approach to cybersecurity across European Union Institutions, Bodies and Agencies (EUIBA). This ensures that all entities are well-protected against evolving cyber threats and capable of executing a coordinated incident […]

Read more