{"id":361,"date":"2020-05-17T23:34:30","date_gmt":"2020-05-17T21:34:30","guid":{"rendered":"https:\/\/www.spacesecurity.info\/?page_id=361"},"modified":"2020-05-20T23:01:01","modified_gmt":"2020-05-20T21:01:01","slug":"homepage","status":"publish","type":"page","link":"https:\/\/www.spacesecurity.info\/en\/","title":{"rendered":"Homepage"},"content":{"rendered":"<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_361\" class=\"pvc_stats all  \" data-element-id=\"361\" style=\"\"><i class=\"pvc-stats-icon small\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div><div id=\"tdi_1\" class=\"tdc-zone\"><div class=\"tdc_zone tdi_2  wpb_row td-pb-row\"  >\n<style scoped>\n\/* custom css - generated by TagDiv Composer *\/\n\n\/* custom css - generated by TagDiv Composer *\/\n.tdi_2{\r\n                    min-height: 0;\r\n                }\n<\/style><div id=\"tdi_3\" class=\"tdc-row\"><div class=\"vc_row tdi_4  wpb_row td-pb-row\" >\n<style scoped>\n\/* custom css - generated by TagDiv Composer *\/\n\n\/* custom css - generated by TagDiv Composer *\/\n.tdi_4,\r\n                .tdi_4 .tdc-columns{\r\n                    min-height: 0;\r\n                }.tdi_4,\r\n\t\t\t\t.tdi_4 .tdc-columns{\r\n\t\t\t\t    display: block;\r\n\t\t\t\t}.tdi_4 .tdc-columns{\r\n\t\t\t\t    width: 100%;\r\n\t\t\t\t}.tdi_4:before,\r\n\t\t\t\t.tdi_4:after{\r\n\t\t\t\t    display: table;\r\n\t\t\t\t}\n<\/style><div class=\"vc_column tdi_6  wpb_column vc_column_container tdc-column td-pb-span12\">\n<style scoped>\n\/* custom css - generated by TagDiv Composer *\/\n\n\/* custom css - generated by TagDiv Composer *\/\n.tdi_6{\r\n                    vertical-align: baseline;\r\n                }.tdi_6 > .wpb_wrapper,\r\n\t\t\t\t.tdi_6 > .wpb_wrapper > .tdc-elements{\r\n\t\t\t\t    display: block;\r\n\t\t\t\t}.tdi_6 > .wpb_wrapper > .tdc-elements{\r\n\t\t\t\t    width: 100%;\r\n\t\t\t\t}.tdi_6 > .wpb_wrapper > .vc_row_inner{\r\n\t\t\t\t    width: auto;\r\n\t\t\t\t}.tdi_6 > .wpb_wrapper{\r\n\t\t\t\t    width: auto;\r\n\t\t\t\t    height: auto;\r\n\t\t\t\t}\n<\/style><div class=\"wpb_wrapper\" ><\/div><\/div><\/div><\/div><div id=\"tdi_7\" class=\"tdc-row\"><div class=\"vc_row tdi_8  wpb_row td-pb-row\" >\n<style scoped>\n\/* custom css - generated by TagDiv Composer *\/\n\n\/* custom css - generated by TagDiv Composer *\/\n.tdi_8,\r\n                .tdi_8 .tdc-columns{\r\n                    min-height: 0;\r\n                }.tdi_8,\r\n\t\t\t\t.tdi_8 .tdc-columns{\r\n\t\t\t\t    display: block;\r\n\t\t\t\t}.tdi_8 .tdc-columns{\r\n\t\t\t\t    width: 100%;\r\n\t\t\t\t}.tdi_8:before,\r\n\t\t\t\t.tdi_8:after{\r\n\t\t\t\t    display: table;\r\n\t\t\t\t}\n<\/style><div class=\"vc_column tdi_10  wpb_column vc_column_container tdc-column td-pb-span12\">\n<style scoped>\n\/* custom css - generated by TagDiv Composer *\/\n\n\/* custom css - generated by TagDiv Composer *\/\n.tdi_10{\r\n                    vertical-align: baseline;\r\n                }.tdi_10 > .wpb_wrapper,\r\n\t\t\t\t.tdi_10 > .wpb_wrapper > .tdc-elements{\r\n\t\t\t\t    display: block;\r\n\t\t\t\t}.tdi_10 > .wpb_wrapper > .tdc-elements{\r\n\t\t\t\t    width: 100%;\r\n\t\t\t\t}.tdi_10 > .wpb_wrapper > .vc_row_inner{\r\n\t\t\t\t    width: auto;\r\n\t\t\t\t}.tdi_10 > .wpb_wrapper{\r\n\t\t\t\t    width: auto;\r\n\t\t\t\t    height: auto;\r\n\t\t\t\t}\n<\/style><div class=\"wpb_wrapper\" ><div class=\"td_block_wrap td_block_12 tdi_11 td_with_ajax_pagination td-pb-border-top td_block_template_1 td-column-3\"  data-td-block-uid=\"tdi_11\" ><script>var block_tdi_11 = new tdBlock();\nblock_tdi_11.id = \"tdi_11\";\nblock_tdi_11.atts = '{\"ajax_pagination\":\"infinite\",\"limit\":\"\",\"block_type\":\"td_block_12\",\"separator\":\"\",\"custom_title\":\"\",\"custom_url\":\"\",\"block_template_id\":\"\",\"m11_tl\":\"\",\"m11_el\":\"\",\"post_ids\":\"\",\"category_id\":\"\",\"taxonomies\":\"\",\"category_ids\":\"\",\"in_all_terms\":\"\",\"tag_slug\":\"\",\"autors_id\":\"\",\"installed_post_types\":\"\",\"include_cf_posts\":\"\",\"exclude_cf_posts\":\"\",\"sort\":\"\",\"popular_by_date\":\"\",\"linked_posts\":\"\",\"favourite_only\":\"\",\"offset\":\"\",\"open_in_new_window\":\"\",\"show_modified_date\":\"\",\"time_ago\":\"\",\"time_ago_add_txt\":\"ago\",\"time_ago_txt_pos\":\"\",\"review_source\":\"\",\"el_class\":\"\",\"td_ajax_filter_type\":\"\",\"td_ajax_filter_ids\":\"\",\"td_filter_default_txt\":\"All\",\"td_ajax_preloading\":\"\",\"f_header_font_header\":\"\",\"f_header_font_title\":\"Block header\",\"f_header_font_settings\":\"\",\"f_header_font_family\":\"\",\"f_header_font_size\":\"\",\"f_header_font_line_height\":\"\",\"f_header_font_style\":\"\",\"f_header_font_weight\":\"\",\"f_header_font_transform\":\"\",\"f_header_font_spacing\":\"\",\"f_header_\":\"\",\"f_ajax_font_title\":\"Ajax categories\",\"f_ajax_font_settings\":\"\",\"f_ajax_font_family\":\"\",\"f_ajax_font_size\":\"\",\"f_ajax_font_line_height\":\"\",\"f_ajax_font_style\":\"\",\"f_ajax_font_weight\":\"\",\"f_ajax_font_transform\":\"\",\"f_ajax_font_spacing\":\"\",\"f_ajax_\":\"\",\"f_more_font_title\":\"Load more button\",\"f_more_font_settings\":\"\",\"f_more_font_family\":\"\",\"f_more_font_size\":\"\",\"f_more_font_line_height\":\"\",\"f_more_font_style\":\"\",\"f_more_font_weight\":\"\",\"f_more_font_transform\":\"\",\"f_more_font_spacing\":\"\",\"f_more_\":\"\",\"m11f_title_font_header\":\"\",\"m11f_title_font_title\":\"Article title\",\"m11f_title_font_settings\":\"\",\"m11f_title_font_family\":\"\",\"m11f_title_font_size\":\"\",\"m11f_title_font_line_height\":\"\",\"m11f_title_font_style\":\"\",\"m11f_title_font_weight\":\"\",\"m11f_title_font_transform\":\"\",\"m11f_title_font_spacing\":\"\",\"m11f_title_\":\"\",\"m11f_cat_font_title\":\"Article category tag\",\"m11f_cat_font_settings\":\"\",\"m11f_cat_font_family\":\"\",\"m11f_cat_font_size\":\"\",\"m11f_cat_font_line_height\":\"\",\"m11f_cat_font_style\":\"\",\"m11f_cat_font_weight\":\"\",\"m11f_cat_font_transform\":\"\",\"m11f_cat_font_spacing\":\"\",\"m11f_cat_\":\"\",\"m11f_meta_font_title\":\"Article meta info\",\"m11f_meta_font_settings\":\"\",\"m11f_meta_font_family\":\"\",\"m11f_meta_font_size\":\"\",\"m11f_meta_font_line_height\":\"\",\"m11f_meta_font_style\":\"\",\"m11f_meta_font_weight\":\"\",\"m11f_meta_font_transform\":\"\",\"m11f_meta_font_spacing\":\"\",\"m11f_meta_\":\"\",\"m11f_ex_font_title\":\"Article excerpt\",\"m11f_ex_font_settings\":\"\",\"m11f_ex_font_family\":\"\",\"m11f_ex_font_size\":\"\",\"m11f_ex_font_line_height\":\"\",\"m11f_ex_font_style\":\"\",\"m11f_ex_font_weight\":\"\",\"m11f_ex_font_transform\":\"\",\"m11f_ex_font_spacing\":\"\",\"m11f_ex_\":\"\",\"m11f_btn_font_title\":\"Article read more button\",\"m11f_btn_font_settings\":\"\",\"m11f_btn_font_family\":\"\",\"m11f_btn_font_size\":\"\",\"m11f_btn_font_line_height\":\"\",\"m11f_btn_font_style\":\"\",\"m11f_btn_font_weight\":\"\",\"m11f_btn_font_transform\":\"\",\"m11f_btn_font_spacing\":\"\",\"m11f_btn_\":\"\",\"ajax_pagination_next_prev_swipe\":\"\",\"ajax_pagination_infinite_stop\":\"\",\"css\":\"\",\"tdc_css\":\"\",\"td_column_number\":3,\"header_color\":\"\",\"color_preset\":\"\",\"border_top\":\"\",\"class\":\"tdi_11\",\"tdc_css_class\":\"tdi_11\",\"tdc_css_class_style\":\"tdi_11_rand_style\"}';\nblock_tdi_11.td_column_number = \"3\";\nblock_tdi_11.block_type = \"td_block_12\";\nblock_tdi_11.post_count = \"10\";\nblock_tdi_11.found_posts = \"129\";\nblock_tdi_11.header_color = \"\";\nblock_tdi_11.ajax_pagination_infinite_stop = \"\";\nblock_tdi_11.max_num_pages = \"13\";\ntdBlocksArray.push(block_tdi_11);\n<\/script><div class=\"td-block-title-wrap\"><\/div><div id=tdi_11 class=\"td_block_inner\">\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mitre-estm-emb3d-in-action-analyzing-ops-sat-through-these-dual-frameworks\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2026\/03\/MITRE-ESTM-vs-MITRE-EMB3D-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mitre-estm-emb3d-in-action-analyzing-ops-sat-through-these-dual-frameworks\/\"  rel=\"bookmark\" title=\"MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks\">MITRE ESTM + EMB3D in Action : Analyzing OPS-SAT Through These Dual Frameworks<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2026-03-17T14:37:47+01:00\" >17 March 2026<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mitre-estm-emb3d-in-action-analyzing-ops-sat-through-these-dual-frameworks\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    Disclaimer\r\nPlease be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/mitre-estm-emb3d-in-action-analyzing-ops-sat-through-these-dual-frameworks\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-how-the-new-mitre-estm-embedded-systems-threat-matrix-can-work-in-conjunction-with-the-existing-mitre-emb3d-threat-model\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction with the existing MITRE EMB3D Threat Model\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction with the existing MITRE EMB3D Threat Model\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2026\/03\/MITRE-ESTM-vs-MITRE-EMB3D-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-how-the-new-mitre-estm-embedded-systems-threat-matrix-can-work-in-conjunction-with-the-existing-mitre-emb3d-threat-model\/\"  rel=\"bookmark\" title=\"Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction with the existing MITRE EMB3D Threat Model\">Exploring how the new MITRE ESTM (Embedded Systems Threat Matrix) can work in conjunction...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2026-03-16T14:59:55+01:00\" >16 March 2026<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-how-the-new-mitre-estm-embedded-systems-threat-matrix-can-work-in-conjunction-with-the-existing-mitre-emb3d-threat-model\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    Recently, MITRE released ESTM (Embedded Systems Threat Matrix), a new cybersecurity framework designed to protect embedded systems. Built on the proven ATT&amp;CK\u00ae methodology, ESTM...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-how-the-new-mitre-estm-embedded-systems-threat-matrix-can-work-in-conjunction-with-the-existing-mitre-emb3d-threat-model\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/sparta-v3-2-raising-the-bar-for-threat-informed-space-cybersecurity\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"SPARTA v3.2: Raising the Bar for Threat\u2011Informed Space Cybersecurity\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"SPARTA v3.2: Raising the Bar for Threat\u2011Informed Space Cybersecurity\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2026\/03\/SPARTA-01-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/sparta-v3-2-raising-the-bar-for-threat-informed-space-cybersecurity\/\"  rel=\"bookmark\" title=\"SPARTA v3.2: Raising the Bar for Threat\u2011Informed Space Cybersecurity\">SPARTA v3.2: Raising the Bar for Threat\u2011Informed Space Cybersecurity<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2026-03-11T19:44:27+01:00\" >11 March 2026<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/sparta-v3-2-raising-the-bar-for-threat-informed-space-cybersecurity\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    The Aerospace Corporation has released SPARTA v3.2, further strengthening its role as a practical, threat\u2011informed framework for securing modern space missions against sophisticated cyberattacks.\r\n\r\n\r\n\r\nThis...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/sparta-v3-2-raising-the-bar-for-threat-informed-space-cybersecurity\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/introducing-the-new-mitre-embedded-systems-threat-matrix-estm\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2026\/03\/ESTMnew-1-324x235.jpeg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/introducing-the-new-mitre-embedded-systems-threat-matrix-estm\/\"  rel=\"bookmark\" title=\"Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)\">Introducing the new MITRE Embedded Systems Threat Matrix (ESTM)<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2026-03-10T19:10:58+01:00\" >10 March 2026<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/introducing-the-new-mitre-embedded-systems-threat-matrix-estm\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    Embedded systems have become the unsung heroes of modern technology. They power our satellites, medical devices, vehicles, and industrial infrastructures, quietly operating at the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/introducing-the-new-mitre-embedded-systems-threat-matrix-estm\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mapping-the-thales-satellite-hacking-demo-using-sparta-ttps-and-pwnsat-attck-flow-builder-fork\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&#038;CK Flow Builder fork\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&#038;CK Flow Builder fork\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Attack-Flow-builder-MITRE-324x235.png\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mapping-the-thales-satellite-hacking-demo-using-sparta-ttps-and-pwnsat-attck-flow-builder-fork\/\"  rel=\"bookmark\" title=\"Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&#038;CK Flow Builder fork\">Mapping the Thales Satellite Hacking Demo using SPARTA TTPs and PWNSAT ATT&#038;CK Flow Builder...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2026-01-13T15:48:56+01:00\" >13 January 2026<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/mapping-the-thales-satellite-hacking-demo-using-sparta-ttps-and-pwnsat-attck-flow-builder-fork\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    In 2023, during the CYSAT conference, Thales presented a live demonstration of a satellite hacking scenario, a milestone event that shed light on the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/mapping-the-thales-satellite-hacking-demo-using-sparta-ttps-and-pwnsat-attck-flow-builder-fork\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/2nd-international-conference-on-gravitation-astrophysics-and-cosmology-icgac2026-april-16-18-2026-in-paris-france\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) &#8211; April 16-18, 2026 in Paris, France.\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) &#8211; April 16-18, 2026 in Paris, France.\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/11\/1754287146269-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/2nd-international-conference-on-gravitation-astrophysics-and-cosmology-icgac2026-april-16-18-2026-in-paris-france\/\"  rel=\"bookmark\" title=\"2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) &#8211; April 16-18, 2026 in Paris, France.\">2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) &#8211; April 16-18, 2026 in...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2025-11-25T14:22:40+01:00\" >25 November 2025<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/2nd-international-conference-on-gravitation-astrophysics-and-cosmology-icgac2026-april-16-18-2026-in-paris-france\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    We are pleased to announce that the 2nd International Conference on Gravitation, Astrophysics and Cosmology (ICGAC2026) will be held on April 16-18, 2026, in...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/2nd-international-conference-on-gravitation-astrophysics-and-cosmology-icgac2026-april-16-18-2026-in-paris-france\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/two-big-announcements-the-release-of-sparta-v3-1-with-mitres-emb3d-mapping-and-the-release-of-a-mitre-attack-flow-builder-fork-using-the-sparta-framework\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"Two big announcements : the release of SPARTA v3.1 with MITRE\u2019s EMB3D mapping and the release of a MITRE Attack Flow Builder fork using the SPARTA Framework\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"Two big announcements : the release of SPARTA v3.1 with MITRE\u2019s EMB3D mapping and the release of a MITRE Attack Flow Builder fork using the SPARTA Framework\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/09\/SPARTA-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/two-big-announcements-the-release-of-sparta-v3-1-with-mitres-emb3d-mapping-and-the-release-of-a-mitre-attack-flow-builder-fork-using-the-sparta-framework\/\"  rel=\"bookmark\" title=\"Two big announcements : the release of SPARTA v3.1 with MITRE\u2019s EMB3D mapping and the release of a MITRE Attack Flow Builder fork using the SPARTA Framework\">Two big announcements : the release of SPARTA v3.1 with MITRE\u2019s EMB3D mapping and...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2025-09-10T09:48:47+02:00\" >10 September 2025<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/two-big-announcements-the-release-of-sparta-v3-1-with-mitres-emb3d-mapping-and-the-release-of-a-mitre-attack-flow-builder-fork-using-the-sparta-framework\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    In the following article, discover the major advancements announced with the release of SPARTA v3.1: the addition of new NIST space segment guidance, the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/two-big-announcements-the-release-of-sparta-v3-1-with-mitres-emb3d-mapping-and-the-release-of-a-mitre-attack-flow-builder-fork-using-the-sparta-framework\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-meteorstorm-framework-and-the-ai-copilot-part-1\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM\u2122 framework and the AI-CoPilot (Part 1)\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM\u2122 framework and the AI-CoPilot (Part 1)\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/07\/An-analysis-of-the-Thales-satellite-hacking-demo-at-CYSAT-2023-with-the-METEORSTORM\u2122-framework-and-the-AI-CoPilot-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-meteorstorm-framework-and-the-ai-copilot-part-1\/\"  rel=\"bookmark\" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM\u2122 framework and the AI-CoPilot (Part 1)\">An analysis of the Thales satellite hacking demo at CYSAT 2023 with the METEORSTORM\u2122...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2025-07-16T20:17:49+02:00\" >16 July 2025<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-meteorstorm-framework-and-the-ai-copilot-part-1\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    Disclaimer\r\nPlease be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-meteorstorm-framework-and-the-ai-copilot-part-1\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-the-power-of-the-meteorstorm-framework-a-framework-built-for-full-spectrum-modeling-of-current-emerging-and-theoretical-converged-space-cyber-systems\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"Exploring the power of the METEORSTORM\u2122 framework \u2014 a framework built for full-spectrum modeling of current, emerging, and theoretical converged space-cyber systems\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"Exploring the power of the METEORSTORM\u2122 framework \u2014 a framework built for full-spectrum modeling of current, emerging, and theoretical converged space-cyber systems\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/06\/METEORSTORM-Cheat-Sheet-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-the-power-of-the-meteorstorm-framework-a-framework-built-for-full-spectrum-modeling-of-current-emerging-and-theoretical-converged-space-cyber-systems\/\"  rel=\"bookmark\" title=\"Exploring the power of the METEORSTORM\u2122 framework \u2014 a framework built for full-spectrum modeling of current, emerging, and theoretical converged space-cyber systems\">Exploring the power of the METEORSTORM\u2122 framework \u2014 a framework built for full-spectrum modeling...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2025-06-21T10:38:40+02:00\" >21 June 2025<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-the-power-of-the-meteorstorm-framework-a-framework-built-for-full-spectrum-modeling-of-current-emerging-and-theoretical-converged-space-cyber-systems\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    I&#039;m very proud to have successfully taken up a new challenge exam in beta version about METEORSTORM\u2122 framework which allowed me to obtain the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/exploring-the-power-of-the-meteorstorm-framework-a-framework-built-for-full-spectrum-modeling-of-current-emerging-and-theoretical-converged-space-cyber-systems\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 -->\n\n\t<div class=\"td-block-span12\">\n\r\n        <div class=\"td_module_11 td_module_wrap td-animation-stack\">\r\n            <div class=\"td-module-thumb\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/\"  rel=\"bookmark\" class=\"td-image-wrap \" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model\" ><img loading=\"lazy\" decoding=\"async\" class=\"entry-thumb\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUQAAADrAQMAAAArGX0KAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAACBJREFUaN7twTEBAAAAwiD7pzbEXmAAAAAAAAAAAACQHSaOAAGSp1GBAAAAAElFTkSuQmCC\" alt=\"\" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model\" data-type=\"image_tag\" data-img-url=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow-324x235.jpg\"  width=\"324\" height=\"235\" \/><\/a><\/div>\r\n            <div class=\"item-details\">\r\n                <h3 class=\"entry-title td-module-title\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/\"  rel=\"bookmark\" title=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model\">An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE...<\/a><\/h3>\r\n                <div class=\"td-module-meta-info\">\r\n                                        <span class=\"td-post-author-name\"><a href=\"https:\/\/www.spacesecurity.info\/en\/author\/francois\/\">Fran\u00e7ois Quiquet<\/a> <span>-<\/span> <\/span>                    <span class=\"td-post-date\"><time class=\"entry-date updated td-module-date\" datetime=\"2025-03-18T08:58:59+01:00\" >18 March 2025<\/time><\/span>                    <span class=\"td-module-comments\"><a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#respond\">0<\/a><\/span>                <\/div>\r\n\r\n                <div class=\"td-excerpt\">\r\n                    Disclaimer\r\nPlease be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the...                <\/div>\r\n\r\n                <div class=\"td-read-more\">\r\n                    <a href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/\">Read more<\/a>\r\n                <\/div>\r\n            <\/div>\r\n\r\n        <\/div>\r\n\r\n        \n\t<\/div> <!-- .\/td-block-span12 --><\/div><div class=\"td_ajax_infinite\" id=\"next-page-tdi_11\" data-td_block_id=\"tdi_11\"> <\/div><div class=\"td-load-more-wrap td-load-more-infinite-wrap\" id=\"infinite-lm-tdi_11\"><a href=\"#\" class=\"td_ajax_load_more td_ajax_load_more_js\" aria-label=\"Load more\" id=\"next-page-tdi_11\" data-td_block_id=\"tdi_11\">Load more<i class=\"td-icon-font td-icon-menu-down\"><\/i><\/a><\/div><\/div> <!-- .\/block --><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-361","page","type-page","status-publish"],"a3_pvc":{"activated":true,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Homepage - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Homepage - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-20T21:01:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Homepage - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"datePublished\":\"2020-05-17T21:34:30+00:00\",\"dateModified\":\"2020-05-20T21:01:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Homepage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Homepage - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/","og_locale":"en_US","og_type":"article","og_title":"Homepage - Space &amp; Cybersecurity Info","og_url":"https:\/\/www.spacesecurity.info\/en\/","og_site_name":"Space &amp; Cybersecurity Info","article_modified_time":"2020-05-20T21:01:01+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Homepage - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"datePublished":"2020-05-17T21:34:30+00:00","dateModified":"2020-05-20T21:01:01+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"Homepage"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":8,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/361\/revisions"}],"predecessor-version":[{"id":512,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/361\/revisions\/512"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}