UPSTREAM BLOG

Complying with NHTSA’s new order for crash reporting

The National Highway Traffic Safety Administration (NHTSA) issued a Standing General Order requiring manufacturers and operators of vehicles equipped with SAE Levels 2-5 to report crashes.

Warning: This car may contain vulnerable software or hardware

Upstream’s AutoThreat product manager dives into the growing challenge that OEMs and Tier 1s face in their management of the automotive supply chain and the potential cybersecurity impact.

What Does a Magical God of Death Have to Do With Automotive Cybersecurity?

Take a Deeper Look: This review offers deeper visibility into a pertinent automotive cyber risk and offers insight into potential mitigations.

From a Single TCU to Full Control

Take a Deeper Look: This review offers deeper visibility into a pertinent automotive cyber risk and offers insight into potential mitigations.
Understanding the UNECE WP29

Understanding the UNECE WP.29 Cybersecurity Regulation (CSMS)

[Blog] On June 25, 2020, after roughly two years of preparations and revisions, the United Nations formally adopted two new regulations on automotive cybersecurity.
ISO/SAE 21434

ISO/SAE 21434: Setting the Standard for Automotive Cybersecurity

[Blog] Understanding the ISO/SAE 21434 draft standard and Upstream Security’s solutions for effective compliance in the realm of automotive cybersecurity

Upstream - $30M Series B for Shifting into High Gear

[Blog | by Yoav Levy, CEO and Co-founder] Today, we’re announcing the closing of our Series B of funding of $30 million, bringing together a global syndicate of some of the ...
Automotive Cybersecurity, Fleet Cybersecurity, Telematics Cybersecurity

How to Protect Against Telematics Server Attacks

A blog discussing telematics server attacks, how hackers find and take advantage of this vulnerability, and how companies can prevent them from reoccurring
Automotive Cybersecurity, Fleet Cybersecurity, Telematics Cybersecurity

How to Mitigate Keyless Entry Attacks

A blog discussing the growing crime phenomenon of keyless entry attacks and how Upstream Security can mitigate them