Can Your Radio Take Control of Your Truck?

TEAM UPSTREAM

Cybersecurity risks facing the automotive industry are rapidly evolving beyond ransomware attacks on fleets. Hackers can weaponize connected vehicles through a wide array of connected components and applications, compromising sensitive data, operational availability, and even safety. Software-defined vehicles, unsecured APIs, and mobile applications introduce additional new attack vectors that malicious actors can exploit.

Haim Kantor, Upstream’s North American president, joined Hot Talks Trucking to share his insights. Kantor examines the evolving cyber threats and strategies to fortify defenses effectively.

In this episode of HDT Talks Trucking:

  • How hackers find ways to bypass vehicle security features
  • APIs and mobile apps create new entry points for attacks
  • EVs face emerging cyber risks across the entire ecosystem

 

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Don’t wait for warranty claims to pile up

Don’t wait for warranty claims to pile up. Using your connected vehicle data, repair order trends, and DTC analytics you can detect patterns before they…

More Details

Too many claims, not enough time

Too many claims, not enough time. Upstream helps you cut through the noise with AI-powered prioritization: ranking issues by impact, predicted cost, and severity so…

More Details

Speed matters when quality claims hit

Speed matters when quality claims hit. With Upstream’s proactive quality detection, you can accelerate root cause analysis by seeing every vehicle in full context: claims,…

More Details

Turn complex vehicle data into instant answers

Turn complex vehicle data into instant answers with Upstream’s Ocean AI. See how “talking to your data” makes analysis simple. Ask questions, spot issues, set…

More Details

프랑스어 요약 – 모빌리티와 IoT의 미래 보안 및 강화

업스트림은 커넥티드 카, IoT, 스마트 모빌리티 데이터의 잠재력을 극대화합니다. 업스트림의 데이터 관리 플랫폼은 진화하는 사이버 위험으로부터 모�

More Details

모빌리티 분야의 사이버 위협에 대한 정보

실행 가능한 수정 권장 사항에 뒷받침된 실행 가능한 장치별 분석을 통해 모빌리티 위협 환경에 대한 탁월한 가시성을 확보하세요.

More Details
Skip to content