Blog:

On 2025-06-23
by Constance Jourdan et Marine Busson
Cybersecurity

Turning compliance into competitive advantage: how NIS2 Directive elevates the need for Resilience

European flags
Across the globe, cyber threats are escalating and regulators are responding in kind. With the introduction of the Network and Information Systems Directive in its second version (NIS2), the European Union (EU) is raising the bar on what it means to be secure, resilient and crisis-ready in the digital age.  The European NIS2 Directive is [...]
  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

Airbus Protect explains: Digital Risk Protection Cybersecurity

What is Digital Risk Protection? Airbus Protect explains

The pace of digital transformation continues to accelerate, with public and private sector organisations embracing cloud, automation and even artificial intelligence. But once you go ‘all digital’, how can you protect your assets? Gareth Davies, CTI and Vulnerability Lead at Airbus Protect, explains why digital risk protection should be on your organisation’s radar. When organisations […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat

Using AD DACL backdoors as a detection primitive for AD enumeration Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short [...]

Read more
A woman BID manager working in front of her laptop Cybersecurity

Women in STEM: Cari Westacott, bid manager

Cari Westacott is a bid manager. Specialising in cybersecurity consulting and managed services projects, she’s responsible for creating and overseeing Airbus Protect’s new business proposals for clients in all sectors. Read on to learn more about her role, and how to apply for bid manager jobs at Airbus Protect. Can you briefly talk about your […]

Read more
woman_working_cybersecurity Cybersecurity

Women in STEM: Sunaina Aytan, cybersecurity consultant

With over four years of cyber experience under her belt, Sunaina Aytan is a cybersecurity consultant based in Airbus Protect’s Newport campus. In this blog, Sunaina explains more about her route into cyber and what attracted her to Airbus Protect – as well as sharing her training and development top tips. Tell us about your […]

Read more
Man working on cybersecurity Cybersecurity

Inside the CSIRT: What does an incident responder do?

Working in cybersecurity, we’ve all heard of the computer security incident response team (CSIRT). But do you know exactly what this often-enigmatic team does on a day-to-day basis? We sat down with Julien Houry, an incident responder at Airbus Protect, to find out. What’s your exact role in the CSIRT? I’m an incident responder. This […]

Read more