« Aerospace Cybersecurity: Satellite Hacking » course review

0
I just successfully completed the comprehensive course on « Aerospace Cybersecurity: Satellite Hacking » and passed successfully the final exam with a result of...

ethicallyHackingspace (eHs)® h4ck32n4u75™ (Hackernauts) Community Member

0
I'm very proud to have been choosen as ethicallyHackingspace(eHs)® h4ck32n4u75™ (Hackernauts) Community Member. Thank's to William Ferguson for this distinction. The "h4ck32n4u75™" badge, pronounced "hackernauts,"...

My cybersecurity review for 2023

0
What an incredible end to 2023. I've had some wonderful experiences. I've successfully met many challenges in cybersecurity. I took part of the 3-day...

23 Tips to Pass CCSK (Certificate of Cloud Security Knowledge) from CSA at the...

0
At the beginning of April 2020, I successfully passed the CCSK certification (Certificate of Cloud Security Knowledge). Now, I give you some tips and...

Top des comptes #Cyber à suivre sur Linkedin

0
Souvent on pense à Twitter pour réaliser sa veille sécu. Mais Linkedin reste une excellente source d'information dans le domaine du cyber. Je vous...

De qui se MOOC-t-on ? Liste des meilleurs MOOCs sur la Cybersécurité

0
J'ai découvert, il y a un certain temps, le monde merveilleux des MOOCs. J'ai voulu découvrir de quoi il s'agissait en participant à des...

Reaching for the Stars with Zero Trust: Space Domain Applications

0
In this article, we will explore if we can apply Zero Trust in space domain, for example in satellites or space missions, how and...

Cloud Security Alliance launched CCZT, the industry-first “Certificate of Competence in Zero Trust”

0
The Cloud Security Alliance (CSA) is a non-profit organization that focuses on promoting best practices for securing cloud computing environments. It was established in...

Very proud to have earned the Kelley School of Business – Space Cybersecurity Professional...

0
I’m pleased to announce that I have obtained a new certification: Kelley School of Business Executive Education Space Cybersecurity from Indiana University - Kelley...

Viasat Attack: A Space Cyber Attack Post Mortem Investigation

0
Introduction In this paper, I choose to investigate the Viasat cyber attack that occurred on 24 February, 2022. First, I will summarize the chronology of...

Last Posts

How to model an attack on an Industrial Control Systems (ICS)

0
Attacks on OT (Operational Technology) systems are made easier due to the OT/IT convergence. The figure below is showing an example of OT/IT convergence. Attacks on OT...

Space and Satellites Security Conferences at DEF CON 32 (and a little bit Aviation...

0
The videos from the Def Con 32 conference held in Las Vegas from August 8th to 11th are now online. Perfect for keeping busy...

My cybersecurity review from the beginning of 2024

0
What an incredible start to 2024. I've had some incredible opportunities and I've been able to do some really interesting things. I continue my role as...

Very proud to receive the certificate of completion : « Introduction to Cybersecurity in...

0
I’m very proud to receive the following certificate of completion for having successfully completed the training course : « Introduction to Cybersecurity in Space...

How I used MITRE EMB3D™ Threat Model to identify Siemens PLC vulnerabilities exploited by...

0
Introduction In this article, I will show how I used the MITRE EMB3D™ Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by...

Popular posts

Description of the Elements of a Satellite Command and Control System

1
In order to be able to analyse the various threats and identify the risks facing a space system, it is necessary to describe precisely...

Install KYPO Cyber Range Platform on Openstack and Ubuntu in AWS cloud

4
KYPO is a Cyber Range Platform (KYPO CRP) developed by Masaryk University since 2013. KYPO CRP is entirely based on state-of-the-art approaches such as...

Cartographie des acteurs étatiques du cyber en France

0
Avec l'aimable autorisation de Martial Le Guédard, nous reproduisons ci-dessous sa cartographie au sujet des différents acteurs étatiques évoluant dans le domaine du Cyber...

What are the threats to space systems?

0
In this article, we will try to identify the various threats to space systems. This article is a synthesis of the CSIS (Center for Strategic...

Qu’est-ce que le grand Commandement De l’Espace (CDE) créé par la France pour la...

0
Le Commandement De l’Espace (CDE) a été créé par arrêté le 3 septembre 2019. Il succède au Commandement interarmées de l’espace (CIE). Il rassemble...