Cybersecurity
industry insights, case studies, technical write-ups and policy updates on automotive cybersecurity
-
AI and the Changing Face of Cybersecurity Posture
In the world of protecting assets from cyber threats, posture is essentially table stakes. All advanced security measures begin where…
Read More » -
Top 10 Cybersecurity Trends To Watch Out For In 2023
In the developing world where everyone is relying on online working and developing their business, it becomes essential to safeguard…
Read More » -
Automotive Ethernet Networks Are Changing the Security Paradigm
Michal Frenkel, Argus Cyber Security Ran Ben Tzvi, Argus Cyber Security One of the more significant developments in vehicle architectures…
Read More » -
Driving through Automotive Cyber Security Proliferation
Background Cyber Security is definitely a new dimension of Automotive Product development process. Automotive Cyber Security industry is still witnessing…
Read More » -
Internet of Things (IoT) Security – What is it, and how can I keep my devices secure?
What is IoT? The Internet of Things (IoT) refers to the billions of physical devices (“things”) that are embedded with…
Read More » -
Automotive cybersecurity: The future of EV charging stations
The automotive industry is evolving continuously where electricity will be a new fuel to these moving objects. We are living…
Read More » -
Threat Intelligent and Smart Cyber Security for Connected Vehicles
Today’s Smart Connected World is evolving with AI (Artificial Intelligence), RPA (Robotic Process Automation), IoET (Internet-of-Everything), Edge Computing and Next…
Read More » -
Securing a Connected Car
The influx of digital transformation and advancements in technology have enabled the automakers to develop cars that are cleaner, safer,…
Read More » -
IDPS: A Perfect Combination of Machine Learning and Big Data for Protecting Vehicles
A combination of Big Data and the headway being made in artificial intelligence (AI) is enabling us to handle data…
Read More » -
Automotive Cyber & Privacy Liability – Risks & Mitigation
The explosion in software and data intensity in CAVs, make them a potential target for hacking and therefore CAVs need…
Read More »