Cyber Security In Space Communications

Increasing demand for satellite communications connectivity and ground observation data, along with the continued conflict in Ukraine and escalating international geopolitical tensions in Gaza and Israel, has sparked a burgeoning interest and substantial investment in the space economy. 

The global space industry, currently valued at around $350 billion, projected to be worth $1 trillion by 2040. With so much at stake,  securing space-based systems has become a  crritical issue.

The Head of Space at the Ministry of Economic Affairs and Communications for Estonia, Paul Liias has said that the main drivers of investment are geopolitical tensions and the increasing demand for satellite communications. “Over the last 12 months as well, the conflict in Ukraine has underscored the strategic importance of space-based satellites and systems, more so than was the case three or four years ago... More than ever, we have a responsibility to manage and protect these systems properly with the latest cybersecurity measures,” Liias in advance the Software Defined Space Conference in Estonia.

The 3rd annual SDSC event focuses on cyber security in space, will take place Oct. 31 to Nov. 2 in Tallinn. The primary focus of this year’s event focused on software development and cyber security  in space technology. 

Liias focused on the importance of cyber security, saying that in order to protect space-based systems from cyber attacks, it is absolutely crucial to bring down the costs. “Developers working in space cyber security have to manage competing priorities. On the one hand, they must investigate, identify, and understand potential threats, and on the other, develop effective countermeasures at an affordable price point. Making space cyber security accessible and affordable is key,” he said.

Estonia is the home of the NATO Cooperative Cyber Defense Centre of Excellence and has been focusing on protecting critical infrastructure like power grids and government IT systems. The goernment now wants to apply its cyber security expertise to space-based assets.

Estonian - Software Defined Space Conference:  I-HLS:    Industrial Cyber:    Cybernews:   

Defense Post:     NATO/CCDCOE:         Image: falco

You Might Also Read: 

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ZTNA Is The Foundation Of Great VDI Deployments
Iranian State Sponsored Hackers On The Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.