Building great solutions for automotive cybersecurity to keep mobility safe.
Based in the heart of the Motor City — Detroit, Michigan — Block Harbor is a managed cybersecurity service provider focused on automakers and suppliers. With deep expertise in cloud, embedded, and automotive systems, we tailor our services and solutions to meet the demands of the rapidly changing connected vehicle and component ecosystem. Every decision on our team is made with passenger safety in mind.
Vehicle System Knowledge
Years of Experience
Vehicle Cybersecurity Labs
- Penetration Testing
- V&V-as-a-Service (VaaS)
- Vehicle Cybersecurity Lab Buildout
Vehicle Security Operations
- Vehicle Security Operations Center (VSOC)
- Threat Analysis & Risk Assessment (TARA)
- Vehicle Cybersecurity Management System (CSMS)
Founding Members of ASRG Detroit
Dedicated to advancing the state of automotive cybersecurity globally.
Winners at DefCon 27 Car Hacking Village
You can trust our experience is proven competitively.
Partners with Keysight Technologies to actualize automotive workbench
Our research and expertise fuel automotive security innovation.
View our capability statement.
UNECE WP.29 audits are set to begin in 2022 and many automakers are in the midst of implementing processes in alignment with ISO/SAE 21434: Road Vehicles – Cybersecurity Engineering. One
The previous posts outlined how to think about what a security design for ISO/SAE 21434 might look like. ISO/SAE 21434 in it’s current state is vague, we want to be
TARA completed, now what? Below is an outline of the subsequent steps taken after completing a TARA within the organization. TARA documents will provide crucial information in determining how security
Concept Phase. The Internet of Things, sounds simple enough right? What about when we integrate embedded devices into the IoT. If not already, in the near future, homes, sidewalks, vehicles,
This year has been a huge success for Block Harbor and we’re proud to be part of pushing our industry forward. Consumer Electronics Show (CES) Early in the year we
THE BACKGROUND. An automotive supplier, well known for smart systems, reached out to us after they suffered a Ransomware attack (we’ll call them “Tyrel Industries” for purposes of this Case
The purpose of a security operation center (SOC) is to protect an organization from cyber attacks by setting up defenses, monitoring to detect cyber incidents, enforcing security policies, and responding
In the following decade, billions of internet connected devices are coming online. Currently we’re seeing many seep into our households: smart speakers, thermostats, and fridges to name a few. In mobility,