Blog:

On 2025-09-15
by Rhidian Jowers, Cybersecurity Architect at Airbus Protect
Cybersecurity

Budgeting for Security Architecture: Making the Business Case for Investment

Security Architecture part 1: budget

In today’s digital-first world, cybersecurity isn’t just an IT cost; it’s a fundamental business enabler and a critical component of risk management. Yet, ask any security architect and they’ll likely tell you that securing adequate budget for robust security architecture initiatives remains a persistent challenge. How do you move beyond simply asking for more money […]

  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

Airbus Protect - Locked Shields exercice Cybersecurity

Airbus Protect at the world’s largest live-fire cyber defence exercise “Locked Shields”

A premiere for Airbus. This year, at the invitation of the Bundeswehr Cyber Security Centre, a team from Airbus Protect took part in the NATO exercise “Locked Shields” for the first time.  What is Locked Shields? The exercise has been conducted annually since 2010 by the “NATO Cooperative Cyber Defence Center of Excellence” (CCDCOE) and […]

Read more
Women in stem - pip Cybersecurity

Women in STEM: Phillipa Phipps, Cybersecurity Consultant

Phillipa Phipps is a Cybersecurity Consultant at Airbus Protect. She didn’t take the traditional route into a cybersecurity career. But that just makes her journey more interesting! Find out more in this interview.

Read more
experts working in a SOC Cybersecurity

How to provide Cyber Threat Intelligence in the frame of a modern SOC?

Find out how to use CTI as an Operational Support (part 1) Introduction to Cyber Threat Intelligence Cyber Threat Intelligence is a discipline of Intelligence applied to the cyber field. According to Kent’s Analytic Doctrine[1], the role of (Cyber) Intelligence Analysts is to provide “information and insights to policy decision-makers and action-takers”. In the context […]

Read more