Cybersecurity and compliance in the age of autonomy
As autonomous technologies advance toward Levels 3-4, securing these innovative systems requires a unique product cybersecurity approach.
Sorted by:
As autonomous technologies advance toward Levels 3-4, securing these innovative systems requires a unique product cybersecurity approach.
When people think of hacking, they usually worry about their computers and phones. But there’s another sector that is seeing a worrisome trend in cyber…
The digital transformation sweeping through the Automotive and Mobility ecosystem has also made its mark on the Agriculture sector. As a result, OEMs, suppliers, and…
In our ongoing series exploring why SIM-enabled IoT devices in the automotive and smart mobility ecosystem should be classified as critical infrastructure, we’ve examined two…
In our ongoing series, exploring the critical nature of SIM-enabled IoT devices, we’ve previously discussed the safety implications of these devices. Our H1’2024 report identifies…
Upstream’s latest H1’2024 report asserts that SIM-enabled IoT devices in the automotive and smart mobility ecosystem should be classified as critical infrastructure. This classification is…
The following content was delivered as part of a keynote during the recent APISEC CON Automotive, which focused on the impact of API security on…
Ensuring driver safety, vehicle safety, and cybersecurity resilience is a top priority for Volta. We’re thrilled to support this commitment and showcase how our collaboration…
In our previous blog, we discussed the complexities of the current cyber threat landscape and the various malicious actors that organizations must be aware of.…
Auto Tech Detroit 2024 highlighted the pressing issue of cybersecurity in the automotive ecosystem. Recorded live during the event, John Heinlein, CMO of Sonatus, had…
Auto Tech Detroit 2024 highlighted the pressing issue of cybersecurity in the automotive ecosystem. Recorded live during the event, John Heinlein, CMO of Sonatus, had…