advanced-menu-icon

Cybersecurity: Setting up an Incident Response Team And Selecting the Team Leader

When it comes to incident response, the quicker a business deals with the threat, the better. It’s not just about being able to respond in a timely manner, it’s also about having the right persons and plan in place to deal with the event effectively.

Read the blog

Evolving Cybersecurity Landscape in ATM: From Infrastructure to Human-Centric Focus

This article explores the general transformation of cybersecurity, shifting from conventional infrastructure to a human-centric approach. Applied to Air Traffic Management these new trends are catering to ATM and the role of Air Traffic Safety Electronic Personnel (ATSEP).

Read the blog

Integrating CSIRT into ATSEP Structure: Achieving Optimal Incident Response for ANSPs

As Air Navigation Service Providers (ANSPs) and regulators seek to bolster their cybersecurity defenses, the debate over whether to include a Computer Security Incident Response Team (CSIRT) within the Air Traffic Safety Electronics Personnel (ATSEP) structure or as part of an IT team remains ongoing.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog

Cyber-Security in Air Traffic Management: Understanding the Power of the Cyber-Security Stack

In the rapidly evolving landscape of cybersecurity, Air Navigation Service Providers and Airports face an ongoing battle against sophisticated threats. To safeguard sensitive data and ensure business continuity, an effective security strategy is important. At the heart of this strategy lies the security stack, a layered approach that fortifies the digital infrastructure against a wide array of cyber threats. In this article, we embark on a journey to explore the intricacies of the security stack, its components, and their vital role in investigating cyber incidents.

Read the blog

ATSEP, Hosting and Schrems II: Ensuring Data Protection in Remote Air Traffic Control and Virtualization

In the context of remote air traffic control operations and service virtualization, legal considerations regarding data sovereignty and data regionality come into play.

Read the blog

EUROCONTROL’s Website Attack And Ongoing Cybersecurity Implications

A distributed denial-of-service (DDoS) attack on Eurocontrol's website has serious consequences, with the potential to disrupt air traffic control across Europe.

Read the blog

The Cyber Threat Landscape Of The Aviation Sector

The ENISA Threat Landscape - Transport Sector  report was recently published, focusing on the EU and four transport sectors - aviation, maritime, rail, and road. In this article, we discuss what is important for Aviation.

Read the blog

European Commission Just Published Regulation (EU 2023/203) on the Management of Information Security Risks in Aviation

Defining rules for the identification & management of information security risks in aviation organizations & aviation competent authorities.

Read the blog