Automotive cybersecurity at the pace of innovation.
Based in the motor city — Detroit, Michigan — Block Harbor is a managed cybersecurity service provider focused on automakers and suppliers. With a deep expertise in cloud, embedded, and automotive systems, we tailor our services & solutions to meet the demands of the rapidly changing connected vehicle and component ecosystem. Every decision on our team is made with passenger safety in mind.
Industrial Control SystemsAutomation and data acquisition in industrial processes begs for an internet connection. We take a hard look and these systems and find ways to facilitate remote connections without compromising on security.
Founding Members of ASRG Detroit
Dedicated to advancing the state of automotive cybersecurity globally.
Winners at DefCon 27 Car Hacking Village
You can trust our experience is proven competitively.
Partners with Keysight Technologies to actualize automotive workbench
Our research and expertise fuel automotive security innovation.
View our capability statement.
The previous posts outlined how to think about what a security design for ISO/SAE 21434 might look like. ISO/SAE 21434 in it’s current state is vague, we want to be
TARA completed, now what? Below is an outline of the subsequent steps taken after completing a TARA within the organization. TARA documents will provide crucial information in determining how security
Concept Phase. The Internet of Things, sounds simple enough right? What about when we integrate embedded devices into the IoT. If not already, in the near future, homes, sidewalks, vehicles,
This year has been a huge success for Block Harbor and we’re proud to be part of pushing our industry forward. Consumer Electronics Show (CES) Early in the year we
THE BACKGROUND. An automotive supplier, well known for smart systems, reached out to us after they suffered a Ransomware attack (we’ll call them “Tyrel Industries” for purposes of this Case
The purpose of a security operation center (SOC) is to protect an organization from cyber attacks by setting up defenses, monitoring to detect cyber incidents, enforcing security policies, and responding
In the following decade, billions of internet connected devices are coming online. Currently we’re seeing many seep into our households: smart speakers, thermostats, and fridges to name a few. In mobility,