From a Single TCU to Full Control
Take a Deeper Look: This review offers deeper visibility into a pertinent automotive cyber risk and offers insight into potential mitigations.
Understanding the UNECE WP.29 Cybersecurity Regulation (CSMS)
[Blog] On June 25, 2020, after roughly two years of preparations and revisions, the United Nations formally adopted two new regulations on automotive cybersecurity.
ISO/SAE 21434: Setting the Standard for Automotive Cybersecurity
[Blog] Understanding the ISO/SAE 21434 draft standard and Upstream Security’s solutions for effective compliance in the realm of automotive cybersecurity
Upstream - $30M Series B for Shifting into High Gear
[Blog | by Yoav Levy, CEO and Co-founder] Today, we’re announcing the closing of our Series B of funding of $30 million, bringing together a global syndicate of some of the ...
How to Protect Against Telematics Server Attacks
A blog discussing telematics server attacks, how hackers find and take advantage of this vulnerability, and how companies can prevent them from reoccurring
How to Mitigate Keyless Entry Attacks
A blog discussing the growing crime phenomenon of keyless entry attacks and how Upstream Security can mitigate them
Automotive Cyber Incidents in H1 2019 Already Surpass All of 2018
A blog delving into the rapid increase in the number of incidents when comparing H1 2019 to the whole of 2018
How to Protect Against Hacks on Car Sharing Services
A blog delving into the case of theft with Daimler Car2Go app, and how to protect against such hacks on car-sharing services
How to Protect Against Remote Multi-Vehicle Attacks
A blog delving into how hackers are gaining access to thousands of cars worldwide and how Upstream's C4 platform helps to protect against remote multi-vehicle attacks
Q1 2019 Sees a Rapid Growth of Automotive Cyber Incidents
A detailed blog taking a deep look into the increase of automotive cyberattacks when comparing Q1 2018 to Q1 2019
3 Approaches to Building a Vehicle Security Operations Center
This blog takes a look into the necessity for building a Vehicle Security Operations Center for large OEMs and how to leverage Upstream’s Automotive Cybersecurity C4 platform
Automotive Cybersecurity automotive security connected car connected car security telematics data Vehicle security operations center VSOC
The Hidden Cyber Risks of Electric Vehicles
A blog taking into consideration the security factors that are facing electric vehicles, and how to stay on top of these risks.
The Power of an Analytics Platform Built for Smart Mobility
Big data analytics is table stakes these days in the business world. To date, Smart Mobility is only scratching the surface of the value to be found in their existing ...
The Business Impact of Weak Security for OEMs
For OEMs, staying on top of security can be a huge business advantage. From regulatory liability to brand damage- how to stay ahead of the competition?
Backend Connected Vehicle Attacks are Taking the Lead
Is the world of cyber-security offering the automotive industry enough protection? Endpoint in-vehicle security alone is not enough.
From Selling Cars to Selling Services- OEMs' Challenges in Securing Complex Data Environments
The rise of the connected car is changing car companies, opening opportunities for OEMs to move into new service models altogether. But connectivity also brings about new cyber risks. How ...
“Talk to our TSP” is not gonna cut it – Fleets Need to Take Responsibility for Their Own Security
Regardless of what the TSPs, cloud companies and cellular providers are doing – it’s time to take control of your own ecosystem.
Cyber-Crime is a Reality in Smart Cities: How Can We Protect Connected Transportation?
Connected transportation in our smart cities makes our daily lives easier and more enjoyable. But more connectivity means more cyber threats, and when a single attack can put an entire ...
A Cybersecurity ‘Glitch’ in the Growing Telematics Insurance Trend
Insurance telematics provides today’s drivers with reduced costs and value-added services, however, it also presents insurers with the challenge faced by every stakeholder in the connected car ecosystem – an ...
Ready to Keep Up with Smart Mobility? The Effects of Connectivity on the MaaS Ecosystem
The automotive industry is undergoing rapid transformation and becoming a smart mobility ecosystem and with it the cyber-attacks surface is expanding, demanding new security standards. This blog explains why smart ...
The Greatest Competitive Advantage for Telematics Service Providers Today - Securing the Connected Car
Cybers threats and data privacy concerns haven’t skipped the TSPs (Telematics Service Providers). The telematics backend servers that enable fleets to be connected, run, analyze, and use the car-generated ...
Cybersecurity Regulation in the Automotive Industry - Who is Responsible for Protecting the Connected Car?
Regulation is slowly catching up with connected car technologies. However, unique complexities in the automotive industry leave a few issues unresolved, namely, who is responsible for protecting the connected car? ...
Automotive Cybersecurity automotive cybersecurity standards automotive security connected car connected car security cybersecurity regulations Telematics Cybersecurity telematics data
Connected Car-Fleets are in Immediate Risk of Cyber Attacks. Here’s What You Can Do About it
There's not a minute to waste - connected car fleets using telematics devices on the road today are in immediate risk of a breach and need cyber protection now! Here's ...
Running the Telematics Service for Your Connected Fleet? Here's what you need to know
The very same car-generated data used to monitor and report the vehicle's tire pressure, can so easily be exploited to hack into its telematics backend servers. Securing telematics data- it ...
The First Step to Securing the Automotive Cloud – A Single Source of Truth
Creating a single source of truth by collecting the entire gathered data under one roof, allows to piece together a holistic, centralized view of the entire connected car's ecosystem and ...
Defense in Depth for the Connected Car
Cybersecurity at its best is a multi-layered solution. It must be, now that everything is connected, and cyber-attacks target not only endpoint devices (cars), but backend servers and whole network ...
Last Week in Tel Aviv Was all About Smart Transportation and Securing Connected Mobility
This past week in Tel Aviv has proved once again that the future of the automotive industry lies in connectivity, mobility as a service, and advanced cybersecurity. This blog is ...
Emerging Data Privacy Regulation Brings OEMs and Consumers Closer Together Than Ever Before
This article discusses OEMs' significant role in protecting consumers' data privacy, and why the emerging robust regulation is actually good news for car makers around the world.
Why AI and ML Offer the Best Protection Against Cyber Attacks on Connected Cars
This article discusses how and why AI and ML technologies are needed to detect cyber threats on connected cars
The Danger of Connected Car Mobile Apps to OEMs and Smart Mobility Services
This article discusses the main risks posed by mobile apps to OEMs, connected cars, and smart mobility services. It explains the primary difficulty in protecting the mobile car app’s ...
artificial intelligence Automotive Cybersecurity automotive fleet security connected car connected car cybersecurity connected car security machine learning Telematics Cybersecurity telematics data
Redefining Connected Car Cybersecurity
Cybersecurity is a business risk, not just an IT problem. Learn what makes Upstream's automotive cybersecurity solution so unique.
Going Beyond IT Cybersecurity Technologies to Protect the Connected Fleet
How can IT cybersecurity practices and technologies be adapted to the automotive world to protect connected cars?
Cutting the Lifeline to the Fleet. Not on Upstream's Watch.
If hackers gain access to the telematics’ private network they could inject remote commands to the fleet's vehicles and cut their lifeline communication.
Ten Hacks in Ten Weeks- is 2018 the Year of the Automotive Cyber Threat?
The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world's leading brands. Here’s a look at these incidents.
Infographic: Top Real-World Threats Facing Connected Cars and Fleets
Here is a snapshot of the top real-world cyber threats challenging connected car ecosystem players.
The Security Car Industry: A Disruptive Journey to a New Business Model
The automotive industry is accelerating at speed towards a technology-centric future. However, one issue dominates the connected car industry and must be addressed: cybersecurity.
No Longer on Cloud Nine: Top Real-World Threats Facing Connected Cars and Fleets
Here is a snapshot of the top real-world cyber security threats highlighting the diversity of attack vectors already challenging connected car ecosystem players.
The Keys to Securing Automotive Fleets: KPMG Report
KPMG recently released their report, ‘Protecting the fleet – and the car business’. It highlights the need to adopt a new automotive security framework.
Securing the Weakest Link in Connected Cars: Telematics Data Servers
While data centers already have many security protections, none are equipped to deal with the unique challenge posed by the automotive world to automotive cybersecurity. In this post, we will ...
Automotive Cybersecurity automotive fleet security automotive security connected car connected car cybersecurity connected car security Fleet Cybersecurity fleets Telematics Cybersecurity telematics data
Huge Risk - Fraud in the Smart Mobility Space
Much has been said about the threat cyber attacks pose to connected cars, however, there are other significant risks for companies using such vehicles
Artificial Intelligence and Automotive Fleet Security Go Hand-in-Hand
How machine learning is an effective tool for fleet security and deep insights
artificial intelligence Automotive Cybersecurity automotive fleet security automotive industry connected car connected car security Fleet Cybersecurity fleets machine learning Telematics Cybersecurity telematics data
Fleet Security: The Sum of All Car Hacking Fears
The fleet-wide hack is a real threat to connected car fleets. Read more to learn why.