Industry 4.0 / IIoT​

Challenges

Industry 4.0, with IIoT, 3D printing, robotics and CPS, is transforming manufacturing technologies through increased automation and connectivity. Open systems pose new risks, requiring integrated cybersecurity from the outset to prevent potential threats.

Our solution and benefits

Moabi provides cybersecurity analyses to evaluate and test new systems and equipment, enabling manufacturers to compare suppliers and demand high levels of security right from the selection process.

Results

Protect Industry 4.0 with consistent, sustainable security audits, based on key metrics to ensure continuous improvement.

Article, News & Post

Recent Blog & Post

Explore our articles for ideas, tips and perspectives on innovation and cybersecurity – perhaps you’ll find the inspiration or answers you’re looking for.

Feedback: the Cyber Founder Tour in Sophia Antipolis ; bridging research, entrepreneurship and real-world practice

On 9 April, we took part in the Cyber Founder Tour in Sophia Antipolis, an event dedicated to the creation and acceleration of cybersecurity start-ups. Held in the ALPHA building, at the heart of the technology park, the event brought together researchers, entrepreneurs, industry representatives and institutional stakeholders around a common goal: to foster and structure the cybersecurity start-ups of the future. A format designed to drive projects forward The day is structured around three key elements: This format is particularly valuable because it goes beyond simply sharing ideas: it allows projects, hypotheses and strategies to be put to the test in a practical way. Academic–industrial collaboration: a key issue At this year’s event, our CTO, Jonathan Brossard, took part in a panel discussion on a fundamental topic: collaboration between academic research and industry. This topic lies at the heart of innovation in cybersecurity. On the one hand, research produces significant technical advances: reverse engineering, vulnerability analysis, new analytical methods. On the other, industry imposes significant constraints: The challenge is not simply to transfer research to industry but to successfully align these two worlds without losing either technical rigour or the ability to deploy at scale. Concrete exchanges with the ecosystem Beyond the conferences, one of the highlights of the day was the one-to-one meetings with industry representatives and institutional stakeholders. These discussions enable participants to: It is often during these discussions that projects evolve most rapidly. The ecosystem present, including notably stakeholders from research, support and funding, demonstrates just how cybersecurity is now a key issue at both regional and national levels. A key point: structuring the cyber ecosystem This type of event highlights a fundamental point: 👉 cybersecurity cannot be built in isolation It relies on a balance between: The Cyber Founder Tour perfectly illustrates this dynamic by bringing these stakeholders together in one place, with a clear objective: to accelerate the transformation of ideas into concrete solutions. What we take away from MOABI At MOABI, this type of event is directly in line with our positioning. We operate at the intersection of advanced cybersecurity research and practical industrial applications These exchanges enable us to compare our technical approaches, refine our use cases and better understand the expectations of industry and institutions They also confirm a key point:👉 issues relating to software security and the software supply chain are becoming increasingly central to discussions. Conclusion The Cyber Founder Tour confirms the importance of these hybrid formats, which sit halfway between a conference, mentoring and targeted networking. In a field as complex as cybersecurity, progress comes not only from technology, but also from the ability to bring the right stakeholders together at the right time. We are delighted to have been able to take part and engage with the ecosystem.

Read More »

Feedback: what we took away from Insomni’hack 2026

We’ve just returned from Insomni’hack, a must-attend hacking conference in Europe, with our conviction further strengthened:cybersecurity remains a field where hands-on practice, experimentation and direct dialogue play a vital role. We would like to thank EPFL once again for their invitation and for allowing us to participate in the event with a stand. Over the course of these few days, we had the opportunity to attend several talks, engage with numerous stakeholders in the ecosystem and discover some particularly interesting technical approaches. Here are a few key takeaways. A stark reminder of the reality of cyberattacks The principal highlight was the screening of the documentary “Don’t go to the police”, presented by Orange Cyberdefense. This type of content offers a different perspective:less technical in form, but extremely concrete in substance. It highlights: This kind of feedback serves as a reminder that behind the vulnerabilities and exploits, there are above all organisations facing complex situations, often in a state of emergency. Demonstrations that reflect the reality on the ground Among the technical demonstrations, some focused on specific attack scenarios, particularly those involving embedded systems. A striking example:a demonstration showing how a vehicle, such as a Tesla, can be targeted via a vector as simple as a USB port. Without going into technical details, this type of demonstration highlights several key points: These examples clearly illustrate the difficulty of securing modern systems, where hardware, software and user interfaces are deeply intertwined. A community as active as ever Beyond the talks, Insomni’hack remains first and foremost a place for exchange. We were able to speak with: These exchanges, often informal, allow us to compare approaches, discover new ideas and better understand the challenges encountered in the field. This is also what makes this type of event so valuable:the opportunity to step outside the usual framework to discuss technical matters directly and openly. What we take away from it This type of conference highlights several key points: Insomni’hack confirms, once again, the importance of technical events within the cybersecurity ecosystem. They not only enable us to keep pace with developments in the field, but also to compare ideas, share feedback and fuel technical discussions. We leave with numerous avenues to explore, fresh ideas, and a desire to continue delving into these topics.

Read More »