Cybersecurity at the pace of innovation.
Block Harbor is a managed cybersecurity service provider focused on automakers and suppliers. With a deep expertise in cloud, embedded, and automotive systems, we tailor our services & solutions to meet the demands of the rapidly changing connected vehicle and component ecosystem. Every decision on our team is made with passenger safety in mind.
AutomotiveThe automotive industry has a bright future with autonomous driving, connected vehicle, and more sophisticated vehicle architectures. Block Harbor has spent years working with automotive companies to address the new cyber risks that vehicles face to keep passengers safe.
CloudCompanies are migrating in droves to the cloud. Block Harbor has spent a lot of time understanding the changing risks and threats as a result from hosted services to serverless computing. We take a hard look at architectures and configurations to keep assets safe.
EmbeddedIt’s an appealing proposal to guide a product to become an Internet of Things device. We take a look at hardware and software to help devices join the internet safely, giving consumers less to worry about.
Industrial Control SystemsAutomation and data acquisition in industrial processes begs for an internet connection. We take a hard look and these systems and find ways to facilitate remote connections without compromising on security.
- Penetration Testing
- Risk Assessment
- Security Team Review
Managed Cybersecurity Solutions
- Managed Security Operations Center
Founding Members of ASRG Detroit
Dedicated to advancing the state of automotive cybersecurity globally.
Winners at DefCon 27 Car Hacking Village
You can trust our experience is proven competitively.
Partners with Keysight Technologies to actualize automotive workbench
Our research and expertise fuel automotive security innovation.
View our capability statement.
The previous posts outlined how to think about what a security design for ISO/SAE 21434 might look like. ISO/SAE 21434 in it’s current state is vague, we want to be
TARA completed, now what? Below is an outline of the subsequent steps taken after completing a TARA within the organization. TARA documents will provide crucial information in determining how security
Concept Phase. The Internet of Things, sounds simple enough right? What about when we integrate embedded devices into the IoT. If not already, in the near future, homes, sidewalks, vehicles,
This year has been a huge success for Block Harbor and we’re proud to be part of pushing our industry forward. Consumer Electronics Show (CES) Early in the year we
THE BACKGROUND. An automotive supplier, well known for smart systems, reached out to us after they suffered a Ransomware attack (we’ll call them “Tyrel Industries” for purposes of this Case
The purpose of a security operation center (SOC) is to protect an organization from cyber attacks by setting up defenses, monitoring to detect cyber incidents, enforcing security policies, and responding
In the following decade, billions of internet connected devices are coming online. Currently we’re seeing many seep into our households: smart speakers, thermostats, and fridges to name a few. In mobility,