The Upstream Blog
Get unique cybersecurity solutions tips for the automotive industry
- Connected Vehicle
- Cybersecurity
Leveraging Cohort Analysis for Fleet-Wide Anomaly Detection in Automotive Cybersecurity
As connected vehicles increasingly dominate the automotive landscape, cybersecurity risks have expanded from isolated, experimental attacks to large-scale threats targeting entire fleets. The stakes have…
- Connected Vehicle
- Cybersecurity
From Cost Center to Value Center: Monetizing Connected Vehicle & Mobility Data in the AI Era (Part 3)
In Part 1 and Part 2 of this series, we discussed the transformative journey of the automotive industry as OEMs evolve from traditional car manufacturers…
- Cybersecurity
- EV Charging
EV CPO Under Siege: A New Attack Exposed the Cybersecurity and Privacy Risks of EV Charging Networks
As the EV revolution accelerates, the spotlight often falls on sustainability, innovation, and range anxiety. However, an underexplored yet critical concern is the cybersecurity of…
- Cybersecurity
- Threat Intelligence
Connecting the Dots: Integrating Auto-ISAC’s ATM with Deep & Dark Web Intelligence for Proactive Automotive Cybersecurity
In March 2024, Auto-ISAC released a significant resource for the automotive industry’s cybersecurity: the Automotive Threat Matrix (ATM). This is an important milestone for Auto-ISAC…
- Cybersecurity
Breaking the (Supply) Chain: The Macroeconomic Stakes of Cybersecurity in Fleet Telematics
In an era where smart mobility and connected technologies are revolutionizing the automotive industry, reliance on telematics and IoT devices to manage fleet operations has…
- Cybersecurity
- Mobility API Security
Upstream’s Ocean AI Dramatically Improves API Security Investigations
As the automotive industry continues its rapid shift towards connectivity and digitalization, API security has become a critical pillar of cybersecurity. GenAI holds transformative potential…
- Cybersecurity
“TikTok on Wheels” Expands to Europe, Considering Stricter Regulations on Chinese Connected Vehicles and Tier-1 Suppliers
Connected vehicles “can register everything where it is, and it can also transmit that data to those who have access to the data… it’s legitimate…