{"id":3491,"date":"2024-09-23T11:30:56","date_gmt":"2024-09-23T09:30:56","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?page_id=3491"},"modified":"2025-11-17T09:34:34","modified_gmt":"2025-11-17T08:34:34","slug":"monthly-watch","status":"publish","type":"page","link":"https:\/\/www.cyberinflight.com\/?page_id=3491","title":{"rendered":"Space Cybersecurity Monthly Watch"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Space Cybersecurity<br>Monthly Watch<\/h1>\n\n\n\n<p>Space cybersecurity has recently seen a growing interest from space stakeholders&nbsp;triggered by major events and cyberattacks targetting the space industry. The topic is wide and can be tackled from various angles (economic, technological, regulatory, threat-intel oriented and so forth) making it complex and time-consuming to get a global understanding of this field.<\/p>\n\n\n\n<p><strong>CyberInflight is committed to helping you in this process by providing a Monthly Watch<\/strong> <strong>dedicated to Space Cybersecurity, <\/strong>which analyzes monthly news trends.<\/p>\n\n\n\n<p>Cyberinflight\u2019s monthly watch is composed of the<strong> Monthly Highlights<\/strong>, which allows one to dive into the main trends of the month, an<strong> analysis of the average monthly RISC Score<\/strong>, an <strong>overview of the main Weekly Observations<\/strong>, and an <strong>article written by an expert on a specific topic.<\/strong><\/p>\n\n\n\n<p>The <strong>Monthly Watch comes with a Monthly Webinar<\/strong> where the main insights are presented and discussed in more detail.<\/p>\n\n\n\n<p>The <strong>June to December 2024 Monthly Watches are available<\/strong> for download below, and the <strong>August 2025 Monthly Webinar is available<\/strong> for viewing.<\/p>\n\n\n\n<p><strong>Get access to the latest watches<\/strong> through the registration address : <strong>research@cyberinflight.com<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" controls src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2025\/11\/CyberInflight-August-2025-webinaire.mp4\"><\/video><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<meta charset=\"UTF-8\">\n\n\n\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n\n\n\n<title>Tableau sans Bordure avec Largeur Sp\u00e9cifi\u00e9e<\/title>\n\n\n\n<style>\n    table {\n      border-collapse: collapse; \/* \u00c9limine l'espace entre les cellules *\/\n      width: 50%; \/* Largeur totale du tableau *\/\n    }\n    th, td {\n      padding: 0; \/* Padding minimal pour des cellules tr\u00e8s \u00e9troites *\/\n    }\n    th:first-child, td:first-child {\n      width: 60%; \/* Largeur de la premi\u00e8re colonne *\/\n    }\n    th {\n      font-weight: bold; \/* Met en gras le texte dans les cellules d'en-t\u00eate *\/\n    }\n  <\/style>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>2024<\/th><th>RISC Score<\/th><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"\" href=\"https:\/\/www.cyberinflight.com?download=3689&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3689\" >\n\tDecember.pdf<\/a>\n<\/td><td>1.2<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"\" href=\"https:\/\/www.cyberinflight.com?download=3630&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3630\" >\n\tNovember.pdf<\/a>\n<\/td><td>1.78<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"\" href=\"https:\/\/www.cyberinflight.com?download=3585&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3585\" >\n\tOctober.pdf<\/a>\n<\/td><td>1.90<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"\" href=\"https:\/\/www.cyberinflight.com?download=3531&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3531\" >\n\tSeptember.pdf<\/a>\n<\/td><td>1.52<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"\" href=\"https:\/\/www.cyberinflight.com?download=3501&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3501\" >\n\tAugust.pdf<\/a>\n<\/td><td>1.63<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"Version july monthly watch\" href=\"https:\/\/www.cyberinflight.com?download=3498&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3498\" >\n\tJuly.pdf<\/a>\n<\/td><td>59.75%<\/td><\/tr><tr><td><a  data-e-Disable-Page-Transition=\"true\" class=\"download-link\" title=\"Version june monthly watch\" href=\"https:\/\/www.cyberinflight.com?download=3495&amp;tmstv=1776604397\" rel=\"nofollow\" id=\"download-link-3495\" >\n\tJune.pdf<\/a>\n<\/td><td>56.75%<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Space CybersecurityMonthly Watch Space cybersecurity has recently seen a growing interest from space stakeholders&nbsp;triggered by major events and cyberattacks targetting the space industry. The topic is wide and can be tackled from various angles (economic, technological, regulatory, threat-intel oriented and so forth) making it complex and time-consuming to get a global understanding of this field. &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?page_id=3491\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Space Cybersecurity Monthly Watch&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3491","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/3491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3491"}],"version-history":[{"count":25,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/3491\/revisions"}],"predecessor-version":[{"id":4267,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/3491\/revisions\/4267"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}