Blog:

On 2025-06-23
by Constance Jourdan et Marine Busson
Cybersecurity

Turning compliance into competitive advantage: how NIS2 Directive elevates the need for Resilience

European flags
Across the globe, cyber threats are escalating and regulators are responding in kind. With the introduction of the Network and Information Systems Directive in its second version (NIS2), the European Union (EU) is raising the bar on what it means to be secure, resilient and crisis-ready in the digital age.  The European NIS2 Directive is [...]
  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

experts working in a SOC Cybersecurity

How to provide Cyber Threat Intelligence in the frame of a modern SOC?

Find out how to use CTI as an Operational Support (part 1) Introduction to Cyber Threat Intelligence Cyber Threat Intelligence is a discipline of Intelligence applied to the cyber field. According to Kent’s Analytic Doctrine[1], the role of (Cyber) Intelligence Analysts is to provide “information and insights to policy decision-makers and action-takers”. In the context […]

Read more
Star Wars Day with Airbus Protect Sustainability

Star Wars Day 2023 – Airbus Protect’s challenge

For Star Wars Day, we invited employees of Airbus Protect to invent a new and sustainable mode of transportation in the Star Wars Universe. Here are the winning answers from our contest: ANSWER 1: 3 options for all types of travel by Leo Picou I’ll start by splitting the type of trip into three categories […]

Read more
man search on Internet cybersecurity information Cybersecurity

Cybersecurity jargon busting: MDR, SOC, EDR, XDR, SOAR and SIEM

MDR, SOC, EDR, XDR, SOAR and SIEM, what does it all mean? In cyber-security, we’re notorious for using an abundance of two, three and even four-word acronyms. If you’re new to the space, these can be confusing, to say the least. To make things a little easier, we’ve created this guide! It explains some of [...]

Read more
AD Canary part 3 Cybersecurity

Active Directory: A canary under your hat part 3

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration This first part explains [...]

Read more
How to ensure hydrogen safety? Hydrogen

Airbus Protect explains: How can we ensure hydrogen safety and security?

You’ve heard a lot of hype around hydrogen as an emerging energy source. But do you know how companies like Airbus Protect are working to mitigate safety and security risks in this sector? Pierre Sécher explains.  Europe’s hydrogen sector is developing fast. Largescale production will soon become a reality and new use cases are being […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat – Part 2

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration  This first part explains […]

Read more