World Autism Awareness Day
Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.
Read moreMeet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.
Read moreOn this International Women's Day, we would like to share with you the inspiring story of three women working for Airbus Protect : Anaïs Sabadie (Airbus Protect France), Cari Westacott (Airbus Protect United Kingdom) and Paula Abbruzzesi (Airbus Protect Germany).
Read moreTo outsiders, the security operations centre (SOC) can seem like an impenetrable black box. To lift the lid on what really goes on inside Airbus Protect’s SOC, we interviewed Pauline and Valentin, two of our analysts.
Read moreFor Star Wars Day, we invited employees of Airbus Protect to invent a new and sustainable mode of transportation in the Star Wars Universe. Here are the winning answers from our contest: ANSWER 1: 3 options for all types of travel by Leo Picou I’ll start by splitting the type of trip into three categories […]
Read moreMDR, SOC, EDR, XDR, SOAR and SIEM, what does it all mean? In cyber-security, we’re notorious for using an abundance of two, three and even four-word acronyms. If you’re new to the space, these can be confusing, to say the least. To make things a little easier, we’ve created this guide! It explains some of […]
Read moreForeword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration This first part explains [...]
Read moreYou’ve heard a lot of hype around hydrogen as an emerging energy source. But do you know how companies like Airbus Protect are working to mitigate safety and security risks in this sector? Pierre Sécher explains. Europe’s hydrogen sector is developing fast. Largescale production will soon become a reality and new use cases are being […]
Read moreForeword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration This first part explains […]
Read moreThe pace of digital transformation continues to accelerate, with public and private sector organisations embracing cloud, automation and even artificial intelligence. But once you go ‘all digital’, how can you protect your assets? Gareth Davies, CTI and Vulnerability Lead at Airbus Protect, explains why digital risk protection should be on your organisation’s radar. When organisations […]
Read more