European Centre for Cybersecurity in Aviation (ECCSA)
ECCSA is primarily an information centre for cybersecurity in aviation providing, amongst other services, stakeholders networking and information sharing, which are key enablers to enforce a resilient aviation cyberspace. ECCSA makes available to its members secure means to exchange domain relevant cybersecurity information, such as vulnerabilities, i.e. weakness that can be used for malicious purposes, as well as events and incidents that might be worth sharing with the aviation community. The ECCSA’s operational team of analysts provides additional inputs as well as context to the information shared by the participants, with the aim to facilitate the creation and the management of an aviation cybersecurity threats knowledge and risk picture.
The participation to ECCSA is voluntary as well as the information sharing. Organisations relevant for the safety and security of European Civil Aviation may apply for ECCSA membership, assured to meet applicable security selection criteria.
News feeds about Cybersecurity in Aviation
The conference, along with the spectacular unmanned systmes exhibition and demonstration organized by iHLS for the sixth year, were an impressing success and reflected the ground-breaking innovation in all fields of robotics and unmanned systems for first responders, HLS and battlefield missions.
Sony a annoncé le développement d'une plateforme de gestion des droits numériques (DRM) basée sur la blockchain. La société basée à Tokyo, Minato, a déclaré lundi que la solution DRM serait axée sur la protection du contenu numérique, y compris les manuels électroniques, la musique, les films, le....
When we think about the industries that have the most to lose from a serious cyber attack, our minds probably immediately go to the finance, healthcare, and energy sectors. And for good reason – as Carbon Black research shows, 78% of IR professionals say they observe attacks on the financial industry most often, with healthcare right behind it.
Home is where the WiFi is. And when there's WiFi, there's a wireless router. You never really think about your router unless your connection becomes unbearably spotty. In which case, you begrudgingly walk over to your router and toggle with its power button until your internet finally allows you to....
)--Rockwell Collins’ legacy of providing state-of-the-art integrated avionics to Embraer’s most technologically advanced business aircraft continues with the selection of Pro Line Fusion for the new Praetor 500 midsize and Praetor 600 super-midsize business jets.
The US Department of Homeland Security (DHS) has decided to enter a 2.5-year partnership with Boeing during which they'll test the company's Black phone, said to possess a chip that self-destructs when stolen or tampered with. At the end of 2014, we were reporting on a
to bring the Boeing Black smartphone to the market.
img src="//default/light-text">The Praetor CLAUDIO CAPUCHO www.estudiocaps.com.br. Embraer introduced midsize and super-midsize business jets Sunday that it aims to launch in 2019, filling out what was already one of the broadest lineups in the market with what the company said will be the longest-range planes in their class.
The Telangana government wants more eyes on the streets to upgrade Hyderabad’s safety. It has asked enterprises, public sectors, residential associations and individuals to install closed-circuit television cameras ( ) in and around their premises. CCTVs More than a lakh CCTVs are expected to be installed across the city in the next few years.
C'est l'une des révélations du livre Mimi, dont Le Point publie en exclusivité les bonnes feuilles. Dans cet ouvrage, Jean-Michel Décugis, Pauline Guéna et notre confrère Marc Leplongeon reviennent sur le sulfureux parcours de Michèle Marchand, dite « Mimi », reine des paparazzis et conseillère....
The rise of electronic warfare has meant the U.S. Army is increasingly facing contested, congested environments. One of the clearest examples is Russia’s incursion into Ukraine, where the Russians utilized sophisticated jamming techniques to block communications and geolocate units based upon their signature in the electromagnetic spectrum.