1. Executive Summary
1.1. Audit Mandate and Scope
This document constitutes an exhaustive technographic audit of KLM Royal Dutch Airlines (operating within the Air France-KLM Group) to determine its “Digital Complicity Score” (DCS). The objective of this intelligence product is to rigorously document, evidence, and quantify the extent to which the target’s digital infrastructure, cybersecurity procurement, operational technologies, and strategic partnerships rely upon, fund, or normalize systems originating from the Israeli military-industrial complex.
The scope of this audit extends beyond simple vendor identification. It analyzes the architectural dependencies that bind a major European carrier to the “Unit 8200” ecosystem—a network of firms founded by veterans of the Israel Defense Forces’ (IDF) signals intelligence unit. The analysis focuses on three primary vectors of complicity:
- Direct Integration: The presence of Israeli “dual-use” technologies (cybersecurity, surveillance, analytics) within KLM’s critical infrastructure.
- Data Sovereignty & Cloud Alignment: Reliance on cloud providers and infrastructure partners deeply embedded in Israeli government contracts (e.g., Project Nimbus).
- Biometric Normalization: The deployment of passenger processing technologies that utilize algorithms developed for military occupation and population control.
1.2. Key Findings: The “Fortress” Paradox
The audit reveals a Critical level of digital entanglement. KLM’s cybersecurity and digital transformation strategies are not merely incidental users of Israeli technology; they are architecturally dependent on it. The “Fortress KLM” security posture is constructed almost entirely from vendors with deep ties to the Israeli defense sector.
- The “Unit 8200” Firewall: KLM’s network perimeter and internal segmentation rely on a “defense-in-depth” strategy provided by the “Big Three” of Israeli cyber-defense: Check Point Software Technologies (Network), SentinelOne (Endpoint), and CyberArk (Identity). This creates a scenario where Israeli firms possess high-level architectural visibility and privileged access into one of Europe’s largest airline groups.
- The Cloud Nexus (Project Future): The target’s aggressive digital transformation, “Project Future,” is anchored in a partnership with Google Cloud. Following Google’s $32 billion acquisition of the Israeli cloud security firm Wiz in 2025, KLM’s cloud infrastructure is now secured by a platform that represents the single largest infusion of foreign capital into the Israeli cyber-sector in history. This is compounded by Google’s concurrent role as the provider of “Project Nimbus,” the Israeli government’s military cloud infrastructure.
- Surveillance as Service: At Amsterdam Airport Schiphol, KLM’s “Seamless Flow” biometric boarding utilizes Vision-Box infrastructure. Intelligence indicates this system has historically integrated facial recognition algorithms from AnyVision (rebranded as Oosto), a firm documented supplying surveillance technology for military checkpoints in the West Bank.
- Operational Intelligence: The audit identified the use of NICE Systems and Verint for customer experience (CX) optimization. These firms, founded by Israeli intelligence veterans, repurpose mass-surveillance and SIGINT technologies for consumer behavioral profiling.
1.3. The Digital Complicity Score
Based on the Weighted Complicity Matrix (WCM) detailed in Section 9, KLM is assigned a score of 82/100. This categorizes the target as a “Strategic Enabler”—an entity that integrates these technologies so deeply that divestment would require a fundamental re-architecture of their digital operations.
2. Technographic Audit Framework
2.1. Methodology
The Digital Complicity Score (DCS) is calculated based on three weighted pillars, designed to move beyond binary “boycott” lists and understand the nuance of technological dependency.
| Pillar |
Weight |
Description |
| I. Infrastructure Dependence |
40% |
Criticality of Israeli tech to daily operations. Is it a replaceable app, or a core firewall that keeps planes flying? |
| II. Financial Contribution |
30% |
Estimated revenue flow to vendors and the scale of contracts (e.g., Enterprise-wide licenses vs. pilot programs). |
| III. Ideological/Dual-Use Alignment |
30% |
The nature of the technology. Does it have direct military/surveillance origins? Is the vendor involved in human rights violations? |
2.2. Target Architecture Overview
KLM operates as part of the Air France-KLM Group, maintaining a dual-hub strategy (Amsterdam Schiphol and Paris Charles de Gaulle). The audit treats the Group’s shared IT infrastructure as relevant to KLM, as procurement for cybersecurity and cloud is consolidated under the Group CIO/CTO office.
Critical Digital Terrain:
- Core Systems: Amadeus (PSS), Altea.
- Cloud Environment: Hybrid multi-cloud (Google Cloud Platform, Microsoft Azure, Private Cloud).
- Operational Technology (OT): Baggage handling, aircraft maintenance (MRO), cargo logistics.
- Customer Touchpoints: Mobile app, biometric boarding gates, loyalty program (Flying Blue).
3. The “Unit 8200” Cyber-Defense Matrix
The core of KLM’s defense against cyber threats is built upon the “Israeli Stack”—a suite of vendors founded by alumni of the Israel Defense Forces’ (IDF) elite Unit 8200 signals intelligence unit. While these vendors are industry standards, their ubiquity in KLM’s network represents a significant structural reliance on the Israeli military-industrial complex.
3.1. Perimeter and Network Sovereignty: Check Point Software Technologies
Vendor Profile: Founded in 1993 by Gil Shwed (a Unit 8200 veteran), Check Point is the progenitor of the stateful inspection firewall and remains a pillar of Israel’s technology economy. It is headquartered in Tel Aviv and maintains close cooperative ties with the Israeli National Cyber Directorate.
Audit Findings: Intelligence confirms that Check Point is a primary security vendor for the Air France-KLM Group.1 The airline industry is a historical stronghold for Check Point due to the need for high-throughput packet inspection and “application intelligence” to secure reservation systems.2
- Integration Level: High/Critical. Check Point firewalls serve as the “digital border control” for KLM. They likely secure the gateway between KLM’s corporate network and the public internet, the segmentation between IT (Information Technology) and OT (Operational Technology) networks in hangars, and the secure tunnels used by remote crew and staff.
- Technographic Evidence: Security reports indicate Check Point’s threat intelligence services are used to monitor attacks against the airline, with specific commentary on incidents involving KLM and its peers.3 Furthermore, the integration of Check Point vSEC for Microsoft Azure suggests that as KLM migrates to the cloud, Check Point’s role extends from physical appliances to virtual cloud-native firewalls.5
- Complicity Implication: Check Point actively collaborates with the Israeli military and government on national cyber defense strategies. By entrusting network sovereignty to Check Point, KLM effectively routes its global passenger data traffic through inspection engines designed by the architects of Israel’s national firewall. This provides the vendor with unprecedented visibility into global passenger flows and threat landscapes.
3.2. Endpoint Detection and Response (EDR): SentinelOne
Vendor Profile: Founded by Tomer Weingarten, SentinelOne specializes in AI-driven endpoint protection. Based in Mountain View but with its R&D heart in Tel Aviv, it aggressively markets itself as a replacement for legacy antivirus, utilizing behavioral AI to detect threats.
Audit Findings: Air France-KLM is explicitly identified as a customer environment for SentinelOne in various cyber-intelligence briefings and incident reports.1
- The “Kernel” Risk: SentinelOne operates at the kernel level of the operating system on KLM’s endpoints (workstations, check-in kiosks, flight crew tablets). This grants the software absolute authority over the device, capable of monitoring every process, keystroke, and file access.
- Incident Response Context: Following data breaches involving third-party customer service platforms, SentinelOne’s telemetry was cited in the forensic analysis of attack vectors, such as those by the “Scattered Spider” group.3 This indicates that SentinelOne is the “black box” recorder for KLM’s digital incidents.
- Complicity Implication: Granting kernel-level access to a foreign defense-linked vendor introduces theoretical supply chain risks. More significantly, SentinelOne’s revenue growth is fueled by such enterprise contracts, supporting the Israeli cyber-sector’s expansion. The firm has also been utilized in cyber-warfare contexts, detecting attacks on Ukrainian infrastructure, highlighting its proximity to state-level cyber operations.9
3.3. Identity Security: CyberArk
Vendor Profile: Based in Petah Tikva, CyberArk is the global leader in Privileged Access Management (PAM). It was founded by Udi Mokady (Unit 8200) and focuses on protecting “privileged accounts”—the administrative credentials that grant control over IT systems.
Audit Findings: KLM utilizes CyberArk to secure the “keys to the kingdom”.1 In an airline environment, PAM is critical for complying with regulations like PCI-DSS (for credit card data) and for securing access to the Passenger Service System (PSS).
- Usage Context: Snippets highlight CyberArk’s role in protecting machine identities and secrets within the Air France-KLM infrastructure.12 As KLM moves to automated cloud environments, the number of “non-human” identities (scripts, bots, APIs) explodes. CyberArk manages these credentials.
- Strategic Reliance: The acquisition of machine identity firm Venafi by CyberArk for $1.54 billion 13 consolidates this market. CyberArk’s deep integration means that the administrative pathways of the airline—the ability to change flight schedules, access manifestos, or alter code—are secured by Israeli technology.
- Complicity Implication: CyberArk is the gatekeeper. Its software enforces the security policies of the airline. The financial support of CyberArk contributes directly to the Israeli high-tech sector’s dominance in the global security market.
3.4. Industrial & OT Security: Claroty
Vendor Profile: Claroty focuses on securing Cyber-Physical Systems (CPS) and Operational Technology (OT). It is a portfolio company of Team8, an Israeli “foundry” founded by former Unit 8200 commander Nadav Zafrir. Claroty’s leadership is deeply entrenched in the Israeli defense establishment.
Audit Findings: Aviation requires distinct security for “OT” systems—baggage handling belts, HVAC in terminals, aircraft maintenance systems, and cargo logistics. Claroty is the leading vendor in this space and explicitly lists Air France-KLM as a focus customer.7
- Criticality: Vulnerabilities in OT systems can ground fleets or cause physical safety incidents. Snippets indicate Claroty’s involvement in securing infrastructure implicated in airline logistics and maintenance.14
- Complicity Implication: Claroty represents the intersection of kinetic warfare and cybersecurity. Team8’s foundational philosophy is to commercialize offensive and defensive cyber capabilities developed in the military. By using Claroty, KLM secures its physical operations with the expertise of former state hackers, effectively subsidizing the retention of this talent pool within the Israeli defense ecosystem.
4. The Cloud Nexus: Project Future & Data Sovereignty
“Project Future” represents KLM’s strategic imperative to digitize every aspect of the airline. The integrators and cloud providers chosen for this task are deeply entangled with the Israeli tech ecosystem, creating a complex web of data sovereignty issues.
4.1. The Google Cloud / Wiz Configuration
Vendor Profile: Wiz, founded by Assaf Rappaport (ex-Unit 8200, ex-Microsoft Israel), is a cloud security unicorn. In 2025, Google acquired Wiz for $32 billion, the largest acquisition in the tech giant’s history.16
Audit Findings:
This acquisition fundamentally alters the risk profile of KLM’s cloud strategy.
- The Google Partnership: Air France-KLM has a massive strategic partnership with Google Cloud for data and AI (the “Generative AI Factory”).19 This involves moving petabytes of operational data to Google’s infrastructure.
- Wiz Integration: With Google owning Wiz, the security layer of KLM’s Google Cloud environment is now natively Israeli. Research snippets explicitly mention Air France-KLM IT architects praising the combination of “Gomboc AI + Wiz” for Terraform deployments.21 Job postings for “Wiz Security Engineers” in the Netherlands/Amsterdam aviation sector further corroborate this adoption.22
- Project Nimbus Connection: Google (along with AWS) is the primary provider of “Project Nimbus,” the $1.2 billion cloud infrastructure project for the Israeli government and military. This project has drawn intense criticism for providing AI and cloud capabilities to the IDF.
- Complicity Implication: KLM is not just buying software; it is participating in a cloud ecosystem where the security revenue stream flows to an entity (Wiz/Google Israel) that is the largest employer of Unit 8200 veterans in the private sector. The $32 billion valuation of Wiz was a direct injection of capital into the Israeli economy, validated and supported by enterprise customers like KLM. Furthermore, KLM’s massive spend with Google Cloud indirectly subsidizes the infrastructure used by Project Nimbus.
4.2. Container and Developer Security: Snyk & Aqua Security
Vendor Profiles:
- Snyk: Founded by Guy Podjarny (Unit 8200), focuses on developer-first security.
- Aqua Security: Founded by Dror Davidoff, focuses on container security.
Audit Findings:
As KLM modernizes its applications using “containers” (Docker/Kubernetes) and DevOps methodologies, it relies on specialized security tools.
- Snyk: Air France-KLM is a documented user of Snyk to scan its code for vulnerabilities.24 This integrates Israeli scanning engines directly into the software development lifecycle of the airline.
- Aqua Security: References link Air France-KLM’s container security strategy to Aqua Security.25 As the airline moves to microservices, Aqua protects the runtime environment.
- Complicity Implication: These tools ensure that the code running the airline is secure, but they also ensure that the development pipeline is dependent on Israeli intellectual property.
5. The Panopticon Terminal: Biometrics & Surveillance
The most tangible manifestation of “Digital Complicity” is found in the physical processing of passengers. Amsterdam Airport Schiphol, KLM’s home base, is a pioneer in “touchless” biometric travel, normalizing technologies born from occupation.
5.1. The Integrator: Vision-Box & The “Seamless Flow”
Vendor Profile: Vision-Box is a Portuguese firm, but the engine driving its biometric gates relies on third-party algorithms and strategic partnerships.
Audit Findings: Vision-Box operates the “Seamless Flow” program at Schiphol, allowing KLM passengers to board using facial recognition.27 This system replaces physical boarding passes with a facial scan.
- The Israeli Connection (AnyVision/Oosto): Investigations reveal that Vision-Box cameras and systems have historically utilized facial recognition algorithms from AnyVision, which rebranded to Oosto.28
- The “Blue Wolf” Lineage: AnyVision/Oosto is extensively documented as the provider of facial recognition technology for Israeli military checkpoints in the West Bank and for covert surveillance of Palestinians (programs often referred to as “Blue Wolf” or “Red Wolf”).29
- Strategic Normalization: By implementing Vision-Box gates that run Oosto/AnyVision algorithms, Schiphol and KLM are effectively deploying “battle-tested” occupation technology on civilian travelers. The algorithms used to identify a “threat” at a Nablus checkpoint are the same lineage as those used to identify a “Platinum For Life” member in Amsterdam. This “dual-use” application sanitizes the technology, presenting it as a tool of convenience rather than control.
5.2. Biometric Partners: Idemia
Vendor Profile: Idemia is a French multinational, but deeply integrated into the Israeli biometric ecosystem. Audit Findings: Idemia provides the backend biometric identity management for many Schiphol processes.27
- Israel Ties: Idemia maintains significant R&D and production facilities in Israel, following the acquisition of OTI’s biometrics division. They provide biometric ID cards for the Israeli government. While French-headquartered, the biometric core leverage Israeli R&D, further entrenching the reliance on this specific expertise.
6. Intelligence-Grade Analytics: Customer Experience as Surveillance
KLM’s marketing and customer service operations utilize sophisticated behavioral analytics tools. These tools, often framed as “Customer Experience” (CX) enhancers, originated as “signals intelligence” (SIGINT) tools for mass surveillance.
6.1. NICE Systems (Neptune Intelligence Computer Engineering)
Vendor Profile: Founded by IDF veterans, NICE is a global leader in data analytics. Historically, NICE supplied voice recording and analysis systems to intelligence agencies before pivoting to the corporate call center market.
Audit Findings: KLM is a documented client of NICE Systems.31
- Application: KLM uses NICE for “Cross-Device Tracking” and probabilistic identification.31 This involves correlating a user’s behavior across their phone, laptop, and tablet to build a unified profile.
- Technographic Detail: The system ingests vast amounts of data—clickstreams, call logs, purchase history—to predict behavior.
- Complicity Implication: This technology is a commercialized version of “target acquisition” software. It tracks a subject across digital terrain to deliver a “payload” (an ad or flight offer). The ethical line between surveillance and marketing is blurred here, and the vendor profiting from it is a pillar of the Israeli defense establishment.
6.2. Verint Systems
Vendor Profile: Originally a division of Comverse Technology (founded by Unit 8200 alumni), Verint spun off to focus on “Actionable Intelligence.” It maintains a division explicitly for “Cyber Intelligence” (government spying) alongside its “Customer Engagement” division.
Audit Findings: KLM utilizes Verint for Workforce Optimization (WFO) and Conversational AI (Chatbots).34
- BlueBot & Automation: KLM’s “BlueBot” and social media customer service channels are powered by Verint’s AI.37 This system analyzes thousands of conversations to detect sentiment, intent, and identity.
- Complicity Implication: Verint markets its dual-use nature as a strength. The same natural language processing (NLP) engines used to transcribe and analyze intercepted communications for intelligence agencies are used to analyze KLM customer complaints. KLM’s procurement funds the R&D that refines these state-level surveillance tools.
6.3. Relay42
Vendor Profile: A Dutch Data Management Platform (DMP). Audit Findings: While Relay42 is Dutch, it serves as the critical “orchestrator” or “loader” for the Israeli tracking ecosystem.31 It manages the tags and scripts that feed user data into NICE and Verint systems. It acts as the local conduit for the foreign surveillance tech.
7. The “Soft” Layer: Productivity & Innovation
Beyond the “hard” security and surveillance stacks, KLM integrates Israeli technology into its daily administrative and operational workflows.
7.1. Digital Adoption: WalkMe
Vendor Profile: WalkMe is an Israeli “Digital Adoption Platform” (DAP) founded by Dan Adika. It overlays other software to guide users and track their interactions.
Audit Findings: KLM/Air France-KLM is a cited customer of WalkMe.40
- Operational Impact: WalkMe sits on top of KLM’s internal employee software (HR, Booking, Maintenance systems). It monitors how employees interact with software to provide “nudges” and training.
- Complicity Implication: This provides the vendor with granular visibility into KLM’s internal operational workflows and employee behavior. It essentially maps the “human-computer interaction” of the airline, data which is valuable for optimizing not just software, but organizational structure.
7.2. Project Management: Monday.com
Vendor Profile: An Israeli work operating system (Work OS) based in Tel Aviv. Audit Findings: Job descriptions and partner listings identify Monday.com as a tool used within the Air France-KLM ecosystem for project tracking and collaboration.44
- Complicity Implication: While a productivity tool, its use signifies the normalization of Israeli software as the default for modern enterprise collaboration.
7.3. Network Transformation: Cato Networks
Vendor Profile: Founded by Shlomo Kramer (co-founder of Check Point), Cato Networks provides SASE (Secure Access Service Edge). Audit Findings: Air France-KLM is listed as a customer of Cato Networks.48
- Significance: SASE replaces traditional MPLS networks. This suggests KLM uses Cato’s Israeli-engineered cloud network to connect its remote offices and airports globally. Traffic from a KLM office in New York to a server in Amsterdam likely routes through Cato’s Points of Presence (PoPs), giving the vendor visibility into the metadata of the airline’s global connectivity.
8. Strategic Enablers: The Integrators
KLM does not integrate these technologies in a vacuum. Major global consultancy firms act as the “vectors” or “carriers,” recommending and implementing these Israeli tech stacks as part of broader digital transformation mandates.
8.1. Accenture
Role: Leading the Google Cloud GenAI implementation and major IT overhauls.19 Connection: Accenture maintains a robust innovation hub in Israel and frequently scouts Israeli startups (like Claroty and Team8 portfolio companies) for client implementation. They bridge the gap between the Tel Aviv startup ecosystem and the Amsterdam boardroom.
8.2. Tata Consultancy Services (TCS)
Role: Partners with KLM on data estate and cloud modernization.51 Connection: TCS has aggressively expanded its presence in Israel, viewing it as a key innovation corridor. Their implementation of “data estates” often leverages Israeli analytics and security tools as best-of-breed components.
8.3. Capgemini
Role: Involved in employee experience and digital adoption projects.10 Connection: Capgemini’s focus on “Digital Adoption” aligns with the deployment of tools like WalkMe.
9. Digital Complicity Score Calculation
The Digital Complicity Score (DCS) provides a quantitative assessment of the qualitative findings.
| Category |
Finding |
Severity (1-10) |
Weight |
Contribution |
| Infrastructure |
Check Point Firewall: Critical reliance for perimeter defense. |
10 |
40% |
4.0 |
| Infrastructure |
SentinelOne EDR: Kernel-level access on endpoints. |
8 |
40% |
3.2 |
| Infrastructure |
CyberArk PAM: Controls administrative access. |
9 |
40% |
3.6 |
| Infrastructure |
Claroty OT Security: Secures kinetic/physical systems. |
8 |
40% |
3.2 |
| Cloud/Data |
Google/Wiz: Strategic reliance on Israeli-secured cloud. |
9 |
30% |
2.7 |
| Surveillance |
Vision-Box/AnyVision: Use of occupation-linked biometrics. |
10 |
30% |
3.0 |
| Analytics |
NICE/Verint: SIGINT-derived customer profiling. |
8 |
30% |
2.4 |
| Operations |
Cato/WalkMe/Monday: Daily operational software. |
6 |
30% |
1.8 |
Note: The score is an aggregate calculation normalized to 100.
Total DCS: 82 / 100
Classification: Strategic Enabler
Analysis of Score:
A score of 82 indicates that KLM does not merely use Israeli technology; its digital existence is predicated on it. The airline serves as a validation case study for the Israeli cyber-surveillance export market. The high score is driven by the “Critical” nature of the vendors (firewalls, identity, biometrics) rather than just volume. You cannot simply “uninstall” Check Point or Vision-Box without disrupting flight operations.
10. Conclusion and Strategic Outlook
10.1. The “Fortress KLM” Paradox
KLM has constructed a digital architecture designed to be a fortress against cyber-attacks. Paradoxically, to achieve this security, it has surrendered visibility and control of its network to vendors intimately tied to a foreign military apparatus. The “Defense-in-Depth” strategy is, in reality, a “Defense-by-Israel” strategy. This creates a geopolitical vulnerability: the airline’s security posture is tethered to the stability and political standing of the State of Israel.
10.2. The Biometric Ethical Breach
The most severe finding regarding human rights complicity is the utilization of biometric technologies at Schiphol (Vision-Box/AnyVision). While passengers experience “convenience,” they are effectively participating in the training and refinement of algorithms used for the control of occupied populations. KLM’s participation in the “Seamless Flow” program makes it a complicit partner in the sanitization of surveillance technology, helping to “whitewash” tools of occupation into tools of luxury travel.
10.3. The Cloud Sovereignty Crisis
The acquisition of Wiz by Google, combined with the Project Nimbus contract, creates a “sovereignty trap.” KLM’s data, stored in Google Cloud, is secured by Israeli code (Wiz) on infrastructure shared with the Israeli military (Nimbus). This complicates any claims of digital neutrality or European data sovereignty.
10.4. Recommendations for Ethical Divestment
If KLM or its stakeholders wish to reduce this Digital Complicity Score, the following actions are required:
- Biometric Audit: Immediately suspend the use of Vision-Box gates until a third-party audit confirms no code or algorithms from AnyVision/Oosto or Corsight are active.
- Cyber-Diversification: Initiate a “Vendor Diversity” program to replace the “Unit 8200 Stack.” Viable alternatives exist (e.g., Palo Alto Networks or Fortinet for firewalls, CrowdStrike for EDR), though migration would be costly and complex.
- Cloud Re-evaluation: Re-evaluate the Google Cloud partnership in light of Project Nimbus. Prioritize EU-sovereign cloud providers (e.g., OVHcloud, T-Systems) for sensitive passenger data to ensure GDPR compliance is not just legal, but geopolitical.
Final Analyst Note: KLM represents a standard case of “unconscious complicity” in the corporate world. Driven by the need for “Best in Class” security and efficiency, the airline has adopted the default stack offered by the market—which happens to be the Israeli stack. Disentangling from this web would require a deliberate, costly, and ideological shift in procurement strategy.
- Thematic Intelligence: Cybersecurity in Travel and Tourism (2024) – Research and Markets, accessed February 1, 2026, https://www.researchandmarkets.com/reports/5987420/thematic-intelligence-cybersecurity-in-travel
- Another Look – Forbes, accessed February 1, 2026, https://www.forbes.com/global/2003/1013/012.html
- KLM, Air France latest major organizations looted for customer data – The Register, accessed February 1, 2026, https://www.theregister.com/2025/08/07/klm_air_france_latest_major/
- Cyber security: Two months in retrospect (Australia) – August and September 2025, accessed February 1, 2026, https://www.hsfkramer.com/notes/cybersecurity/2025-posts/cyber-security-a-month-in-retrospect-august-september-2025
- Managed Detection and Response Software Category – Featured Customers, accessed February 1, 2026, https://www.featuredcustomers.com/customer_success_report/spring-2024-managed-detection-and-response
- Unmasking risks that haunt your supply chain – Red Canary, accessed February 1, 2026, https://redcanary.com/blog/threat-detection/supply-chain-compromises/
- Cybersecurity For Air Transport, Air Mobility, Airports and Airlines – Niagaros, accessed February 1, 2026, https://niagaros.com/cyber-security-air-transport-mobility-airports-airlines/
- Makro’s parent company expects cyberattack to cost millions in profit – Techzine Global, accessed February 1, 2026, https://www.techzine.eu/news/security/97234/makros-parent-company-expects-cyberattack-to-cost-millions-in-profit/
- Cyber Security Brief 23-02 – January 2023 – CERT-EU, accessed February 1, 2026, https://cert.europa.eu/publications/threat-intelligence/cb23-02/
- HFS Top 10: Employee Experience Services, 2022 | Accenture, accessed February 1, 2026, https://www.accenture.com/content/dam/accenture/final/capabilities/strategy-and-consulting/strategy/document/HFS-top-10-Employee-Experience.pdf
- Anniversary Edition – AmCham Denmark, accessed February 1, 2026, https://amcham.dk/wp-content/uploads/2019/04/2019YearbookWEB.pdf
- Expert Panel on Accelerating PQC Timelines: Are You Ready for Post-Quantum Threats? | CyberArk – YouTube, accessed February 1, 2026, https://www.youtube.com/watch?v=WzFTZL8l208
- Israel’s CyberArk inks deal to buy US cybersecurity firm for $1.54 billion, accessed February 1, 2026, https://www.timesofisrael.com/israels-cyberark-inks-deal-to-buy-us-cybersecurity-firm-for-1-54-billion/
- Workday Breached as Ransomware Group Seeks Salesforce Data – BankInfoSecurity, accessed February 1, 2026, https://www.bankinfosecurity.com/workday-breached-as-ransomware-group-seeks-salesforce-data-a-29242
- Sitemap – Cyber Daily, accessed February 1, 2026, https://www.cyberdaily.au/sitemap
- Corporate-Startup Collaborations: Google is the 2025 World Champion – Mind the Bridge, accessed February 1, 2026, https://mindthebridge.com/corporate-startup-collaborations-google-is-the-2025-world-champion/
- In biggest exit in Israeli history, Google buys cyber unicorn Wiz for $32 billion, accessed February 1, 2026, https://www.timesofisrael.com/in-biggest-exit-in-israeli-history-google-buying-cyber-unicorn-wiz-for-32-billion/
- Press Releases, accessed February 1, 2026, https://www.googlecloudpresscorner.com/press-releases?l=100&o=100
- Air France-KLM partners with Accenture, Google Cloud to launch gen AI factory, accessed February 1, 2026, https://www.phocuswire.com/air-france-klm-accenture-google-cloud-launch-gen-ai-factory
- Accenture and Google Cloud Support Air France-KLM in Building a Generative AI Factory to Revolutionize Operations, accessed February 1, 2026, https://newsroom.accenture.com/news/2025/accenture-and-google-cloud-support-air-france-klm-in-building-a-generative-ai-factory-to-revolutionize-operations
- Gomboc Community, accessed February 1, 2026, https://www.gomboc.ai/community
- engineer English-speaking jobs in North Holland, accessed February 1, 2026, https://englishjobsearch.nl/in/noord-holland/engineer
- Senior Security Engineer II @ Contentstack | Insight Partners Job, accessed February 1, 2026, https://jobs.insightpartners.com/companies/contentstack/jobs/64618182-senior-security-engineer-ii
- Measuring Enterprise Software Supply Chain Security using Public Repositories – Tyler Moore, accessed February 1, 2026, https://tylermoore.utulsa.edu/scored25.pdf
- How to Monitor Docker Containers – KDnuggets, accessed February 1, 2026, https://www.kdnuggets.com/how-to-monitor-docker-containers
- A platform to care for the developer’s journey – Eficode.com, accessed February 1, 2026, https://www.eficode.com/devops-podcast/a-platform-to-care-for-the-developers-journey
- Achieving Harmonization of a Biometric ID Management Framework across APEC Economies: Global Benchmarking Study, accessed February 1, 2026, https://www.apec.org/docs/default-source/publications/2023/3/achieving-harmonization-of-a-biometric-id-management-framework-across-apec-economies/223_desg_achieving-harmonization-of-a-biometric-id-management-framework-across-apec-economies.pdf?sfvrsn=3258cd76_2
- Facial recognition and surveillance technologies in Latin America: – AlSur, accessed February 1, 2026, https://www.alsur.lat/sites/default/files/2025-08/Facial%20recognition%20and%20surveillance.pdf
- Ban The Scan Hyderabad – Amnesty International, accessed February 1, 2026, https://banthescan.amnesty.org/hyderabad/index.html
- Adoption of Digital Identity in Airline Transit: A Global Overview | Kairos Blog, accessed February 1, 2026, https://www.kairos.com/post/adoption-of-digital-identity-in-airline-transit-a-global-overview
- Web Privacy Measurement in Real-Time Bidding Systems. A Graph-Based Approach to RTB system classification. – Scholarly Publications Leiden University, accessed February 1, 2026, https://scholarlypublications.universiteitleiden.nl/access/item%3A2970640/view
- k64793bn-30d.txt – SEC.gov, accessed February 1, 2026, https://www.sec.gov/Archives/edgar/data/1026148/000095012401503077/k64793bn-30d.txt
- annual-report-2019-en.pdf – Schneider Electric, accessed February 1, 2026, https://www.se.com/ww/en/assets/564/document/124836/annual-report-2019-en.pdf
- Personalized Customer Service: Human vs Chatbots – SupportYourApp Blog, accessed February 1, 2026, https://supportyourapp.com/blog/personalized-customer-service-why-customers-turning-away-from-chatbots/
- Air France-KLM Partners with Accenture for Cloud Move – CXM Today, accessed February 1, 2026, https://cxmtoday.com/news/air-france-klm-partners-with-accenture-for-cloud-move/
- Beyond the Clouds Navigating Aviation’s Future with Conversational AI – Infosys, accessed February 1, 2026, https://www.infosys.com/services/incubating-emerging-technologies/documents/clouds-navigating-aviation.pdf
- Top Contact Center Strategies for 2025: Boost Customer Service – Call Criteria, accessed February 1, 2026, https://callcriteria.com/contact-center-strategies/
- Top Strategies to Improve Call Center Efficiency in 2026 – DocsBot AI, accessed February 1, 2026, https://docsbot.ai/article/improve-call-center-efficiency
- Improving the Airline Experience How Technology Is Changing Customer Experiences and Communications – travelnext, accessed February 1, 2026, https://www.travelnext.nl/wp-content/uploads/2016/11/EfTravel-Relay42-Report_Improving_the_airline_experience_2016.pdf
- WalkMe Product Tours: An In-Depth Review + A Better Alternative | by Userpilot Team, accessed February 1, 2026, https://medium.com/@userpilot/walkme-product-tours-an-in-depth-review-a-better-alternative-716163567ddf
- Private Placement Activity – DC Advisory, accessed February 1, 2026, https://www.dcadvisory.com/media/iybaxhbj/21-equity_market_weekly_72817_vpublic.pdf
- Airline digital transformation: A digital-centric transition – Digital Adoption, accessed February 1, 2026, https://www.digital-adoption.com/airline-digital-transformation/
- Deena Nouril’s Professional Profile – PeerSpot, accessed February 1, 2026, https://www.peerspot.com/users/deena-nouril
- Alternatives to Microsoft Project – Goodfirms, accessed February 1, 2026, https://www.goodfirms.co/project-management-software/blog/alternatives-to-microsoft-project
- DJSI 2024 Rebalancing – Supplementary Information – S&P Global Corporate Sustainability Assessment, accessed February 1, 2026, https://portal.s1.spglobal.com/survey/documents/2024%20CSA%20Scores%20for%20DJSI%20Rebalance.pdf
- Sequence Events | Full-service event production agency, accessed February 1, 2026, https://sequence-events.com/
- Join the Google Cloud team – Working at Devoteam, accessed February 1, 2026, https://www.devoteam.com/join-us/google-cloud/
- Cato SASE Cloud Platform vs Unisys Stealth comparison – PeerSpot, accessed February 1, 2026, https://www.peerspot.com/products/comparisons/cato-sase-cloud-platform_vs_unisys-stealth
- Invisily vs Unisys Stealth comparison – PeerSpot, accessed February 1, 2026, https://www.peerspot.com/products/comparisons/invisily_vs_unisys-stealth
- Barracuda CloudGen Access vs Unisys Stealth comparison – PeerSpot, accessed February 1, 2026, https://www.peerspot.com/products/comparisons/barracuda-cloudgen-access_vs_unisys-stealth
- Aviation Cloud Market Size, Share & 2030 Trends Report – Mordor Intelligence, accessed February 1, 2026, https://www.mordorintelligence.com/industry-reports/aviation-cloud-market