Articles.
Your automotive cybersecurity education and awareness center.
-
Understanding Cybersecurity Relevance in the Automotive Industry
Introduction ISO/SAE 21434 addresses cybersecurity risks in road vehicles, offering guidelines for managing these… Read more →
-
Block Harbor VSOC Demo App for Splunk
Streamlining the process for monitoring mobility data. For years, Block Harbor has received keen… Read more →
-
Cybersecurity in Automotive Software Update Engineering
The functionalities of modern vehicles are highly dependent on software. For example, if we… Read more →
-
Cybersecurity Assurance Levels in Product Development Lifecycle
Annex E of ISO/SAE 21434 provides a high-level overview of the Cybersecurity Assurance Level… Read more →
-
An introduction into the Automotive Threat Matrix
Imagine a chart that maps out a range of cyber threats and attacks. One… Read more →
-
Supplier Management and ISO/SAE 21434: Ensuring End-to-End Automotive Cybersecurity
As the automotive industry advances towards greater connectivity and autonomy, ensuring robust cybersecurity throughout… Read more →
-
The Importance of Threat Intelligence in VSOCs: Highlighting the role of threat intelligence to stay ahead of attackers
If you work in the cybersecurity industry, you are likely aware of the challenge… Read more →
-
Anyone Else Feel That? — Shifts in Vehicle Cybersecurity.
“Why on earth would you invest in secure boot or removing debug interfaces for… Read more →
-
Importance of Integrating a Robust Cybersecurity Culture within the Cybersecurity Management System (CSMS)
A robust cybersecurity culture is essential to an effective Cybersecurity Management System (CSMS). It… Read more →
-
From Garage to Glory: The Rise of a $100K Automotive Capture the Flag Challenge
Season 1: The Humble Beginnings Our dream when we began crafting our initial Capture… Read more →
-
Secure Product Development Activities in Automotive
In automotive cybersecurity, the product development phase is a critical period where the foundations… Read more →
-
Dear Vulnerable: How may I contact you?
I once heard the CISO of a large OEM refer to security researchers as… Read more →