advanced-menu-icon

Cybersecurity & ATSEP: Security Orchestration, Automation & Response

A cybersecurity software platform with capabilities of automation and integration with other technology designed for a Security Operations Center (SOC) is known as a Security Orchestration, Automation & Response (SOAR) solution. This technology is growing in adoption among security and risk management decision makers. Here's a look at how SOARs function and respond to cyberthreats.

Read the blog

Cybersecurity & ATSEP: Incident management in Security Operations Centers

Security Operations Center (SOCs) are IT units within organizations such as Air Traffic Control or Airport Units that focus on cybersecurity issues. The IT security team at these centers monitors, identifies and analyzes network infrastructure for cyberthreats. Their job is to conduct risk assessment, mitigate risks by taking proactive measures and respond to threats. This team must also communicate with the broader organization's personnel on steps to maintain network safety.

Read the blog

Cybersecurity & ATSEP: Security Operations Centers (SOC) in ATC

Cybersecurity should be a top concern of any business these days, particularly for those in industries that deal with public safety. Air Traffic Control centers must be well prepared to deal with cyberthreats. Recent attacks on large entities such as Air India, the Colonial Pipeline and the Irish Health system elevate the discussion on planning for continuous improvements in cybersecurity. Here's a look at solutions for the aviation industry to make data transmission over electronic networks are as safe as possible.

Read the blog

Introduction into SkyRadar’s Breach, Attack and Defense Simulator for ATSEP Training

SkyRadar’s ATC Breach ,Attack & Defense Simulator has been developed to train ATSEP personnel on how to react to cyberattack in a targeted way, in escalation routines and with minimum down-times. It is part of the modular FreeScopes suite for ATCO and ATSEP training. We refer to it as the BA&D. 

Read the blog

Cybersecurity in Aviation and Air Traffic Control: Regulatory Bodies, Existing Solutions and ATSEP Qualification Requirements

This article looks at the actual cybersecurity ecosystem in aviation and air traffic control: are there norms, documents proposed by the aviation regulation bodies?  What are the existing solutions? Who are the current cybersecurity vendors that propose a solution for aviation, and especially for airports and air traffic control.

Read the blog

Cybersecurity & Air Traffic Control : Revisiting Techniques Used in Cyber-Attacks and Cyber-Defense

The world of Air Traffic Control and the ATSEP have not always been focused on the latest techniques and trends used for cyber attacks and defense. In the past, this competence was not part of the ATSEP's required core qualifications. Recent developments and attacks on public infrastructures however raised awareness significantly. 

Read the blog

Preventing Cyber Attacks in Modern Aviation & Air Traffic Control: an Overview

As our world becomes increasingly and irreversibly connected, Cyber Security is a rising concern in every industry. Modernity has a price: cyberattacks. Everybody has heard about the exploits of criminal hackers against online banking or websites - stealing money or data (Cybercrime/Cyber-activism) - but new sectors are now actively targeted, even sometimes by the so-called ‘state-sponsored attackers’.

Read the blog

Cyber Security in ATC - Lessons Learnt from Gartner's 2021 Cybersecurity Trend Report and its Implications on ATSEP Training

Gartner's 2021 report on cyber security was published just now. And it shows important trends in cybersecurity. This article discusses the implications for ATC cybersecurity and ATSEP qualification and training needs in particular.

Read the blog

A Cyber-Security Training Solution for ATSEP in Air Traffic Management

This article provides a reference setup of an ATSEP cybersecurity infrastructure, based on SkyRadar's ATSEP Cybersecurity Training Module. The main goal is to familiarize students with the most dangerous type of possible attacks, and teach possible countermeasures.

Read the blog