Blog:

On 2026-05-12
by Wadzani Jabani Dagala, Cyber Security Consultant
Cybersecurity

What is Product Security?

product security
Product Security: The invisible Shield.  In the era of modern and interconnected world, Product Security acts as an unseen defense whose tangible effects are clearly observed and felt in our daily lives. While Product Security and Cybersecurity are intrinsically linked, however, they diverge in their priorities especially within the Operational Technology and Critical infrastructure. Cybersecurity, [...]
  • Share

Discover all the latest releases

Understanding the EU AI Act in 5 steps Cybersecurity

The EU AI Act has come into force! Here’s what you need to know.

After long negotiations and discussions between European institutions and bodies, the EU AI Act came into force on August 1, 2024. While Artificial Intelligence offers vast potential and commercial opportunities, the ethical implications and inherent risks of AI mean it must be used responsibly and in moderation. The EU AI Act establishes clear guidelines to […]

Read more
Cybersecurity in industrial and manufacturing environments: Understanding the fundamentals Cybersecurity

Cybersecurity in industrial and manufacturing environments: understanding the fundamentals

Introduction to OT Security Source: CEA list from DIMS event, 16th May 2024   You've probably heard of Industry 4.0 – the ongoing automation of manufacturing and industrial practices using modern technology. More industries are embracing this approach by incorporating IoT, cloud, AI and cyber-physical systems into their production chain. The resulting connectivity boosts productivity [...]

Read more
The naked truth about securing the cloud. Cybersecurity

The naked truth about securing the cloud

Now that every company is using the cloud, whether it be full cloud, hybrid, or SaaS (Software-as-a-Service), they often worry about being secure and sure that they master their flows and data. You can say that this should have been their concern from the very beginning and maybe before but, as often the way, it [...]

Read more
MQTT Hidden talks Cybersecurity

Whispers of the Machines: Exposing MQTT Hidden Talks

Why does IoT need to be secure? With over 15 billion IoT (Internet of Things) devices interconnected worldwide, machines can now ‘talk’ to each other seamlessly. This is enabled by protocols like Message Queuing Telemetry Transport (MQTT), which orchestrate our smart homes, cities and critical infrastructure. The extensive use of MQTT, a lightweight machine-to-machine protocol [...]

Read more
Sustainability explained Sustainability

Airbus Protect explains: the origins of sustainability & decarbonisation

Welcome to our blog series focused on sustainability To begin our series, we will start by looking at the origins of sustainable development and explore basic knowledge on it.  Airbus Protect has a full business unit dedicated to Sustainability services, supporting customers in building sustainable development policies demonstrating a strong commitment to social and environmental [...]

Read more