The Upstream Blog

- Cybersecurity
- EV Charging
EV CPO Under Siege: A New Attack Exposed the Cybersecurity and Privacy Risks of EV Charging Networks
As the EV revolution accelerates, the spotlight often falls on sustainability, innovation, and range anxiety. However, an underexplored yet critical concern is the cybersecurity of…

- Cybersecurity
- Threat Intelligence
Connecting the Dots: Integrating Auto-ISAC’s ATM with Deep & Dark Web Intelligence for Proactive Automotive Cybersecurity
In March 2024, Auto-ISAC released a significant resource for the automotive industry’s cybersecurity: the Automotive Threat Matrix (ATM). This is an important milestone for Auto-ISAC…

- Cybersecurity
Breaking the (Supply) Chain: The Macroeconomic Stakes of Cybersecurity in Fleet Telematics
In an era where smart mobility and connected technologies are revolutionizing the automotive industry, reliance on telematics and IoT devices to manage fleet operations has…

- Cybersecurity
- Mobility API Security
Upstream’s Ocean AI Dramatically Improves API Security Investigations
As the automotive industry continues its rapid shift towards connectivity and digitalization, API security has become a critical pillar of cybersecurity. GenAI holds transformative potential…

- Cybersecurity
“TikTok on Wheels” Expands to Europe, Considering Stricter Regulations on Chinese Connected Vehicles and Tier-1 Suppliers
Connected vehicles “can register everything where it is, and it can also transmit that data to those who have access to the data… it’s legitimate…

- Cybersecurity
Upstream Seamlessly Integrates with Google SecOps
As a comprehensive cybersecurity solution designed specifically for the automotive and smart mobility ecosystem, Upstream offers unparalleled protection against cyber threats targeting connected vehicles, mobility…

- Compliance
- Cybersecurity
Navigating the Evolving Automotive Cybersecurity Regulatory Landscape
Originally published on: April 11, 2024 The automotive industry’s digital transformation has ushered in an era of unprecedented connectivity and technological advancement. Yet, it is…