Cyber Security In Space Communications

Increasing demand for satellite communications connectivity and ground observation data, along with the continued conflict in Ukraine and escalating international geopolitical tensions in Gaza and Israel, has sparked a burgeoning interest and substantial investment in the space economy. 

The global space industry, currently valued at around $350 billion, projected to be worth $1 trillion by 2040. With so much at stake,  securing space-based systems has become a  crritical issue.

The Head of Space at the Ministry of Economic Affairs and Communications for Estonia, Paul Liias has said that the main drivers of investment are geopolitical tensions and the increasing demand for satellite communications. “Over the last 12 months as well, the conflict in Ukraine has underscored the strategic importance of space-based satellites and systems, more so than was the case three or four years ago... More than ever, we have a responsibility to manage and protect these systems properly with the latest cybersecurity measures,” Liias in advance the Software Defined Space Conference in Estonia.

The 3rd annual SDSC event focuses on cyber security in space, will take place Oct. 31 to Nov. 2 in Tallinn. The primary focus of this year’s event focused on software development and cyber security  in space technology. 

Liias focused on the importance of cyber security, saying that in order to protect space-based systems from cyber attacks, it is absolutely crucial to bring down the costs. “Developers working in space cyber security have to manage competing priorities. On the one hand, they must investigate, identify, and understand potential threats, and on the other, develop effective countermeasures at an affordable price point. Making space cyber security accessible and affordable is key,” he said.

Estonia is the home of the NATO Cooperative Cyber Defense Centre of Excellence and has been focusing on protecting critical infrastructure like power grids and government IT systems. The goernment now wants to apply its cyber security expertise to space-based assets.

Estonian - Software Defined Space Conference:  I-HLS:    Industrial Cyber:    Cybernews:   

Defense Post:     NATO/CCDCOE:         Image: falco

You Might Also Read: 

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ZTNA Is The Foundation Of Great VDI Deployments
Iranian State Sponsored Hackers On The Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.