How to Protect Against Telematics Server Attacks
A blog discussing telematics server attacks, how hackers find and take advantage of this vulnerability, and how companies can prevent them from reoccurring
How to Mitigate Keyless Entry Attacks
A blog discussing the growing crime phenomenon of keyless entry attacks and how Upstream Security can mitigate them
Automotive Cyber Incidents in H1 2019 Already Surpass All of 2018
A blog delving into the rapid increase in the number of incidents when comparing H1 2019 to the whole of 2018
How to Protect Against Hacks on Car Sharing Services?
A blog delving into the case of theft with Daimler Car2Go app, and how to protect against such hacks on car-sharing services
How to Protect Against Remote Multi-Vehicle Attacks
A blog delving into how hackers are gaining access to thousands of cars worldwide and how Upstream's C4 platform helps to protect against remote multi-vehicle attacks
Q1 2019 Sees a Rapid Growth of Automotive Cyber Incidents
A detailed blog taking a deep look into the increase of automotive cyberattacks when comparing Q1 2018 to Q1 2019
3 Approaches to Building a Vehicle Security Operations Center
This blog takes a look into the necessity for building a Vehicle Security Operations Center for large OEMs and how to leverage Upstream’s Automotive Cybersecurity C4 platform
Automotive Cybersecurity Connected Car Security Telematics Data Vehicle security operations center VSOC
The Business Impact of Weak Security for OEMs
For OEMs, staying on top of security can be a huge business advantage. From regulatory liability to brand damage- how to stay ahead of the competition?
From Selling Cars to Selling Services- OEMs' Challenges in Securing Complex Data Environments
The rise of the connected car is changing car companies, opening opportunities for OEMs to move into new service models altogether. But connectivity also brings about new cyber risks. How ...
Defense in Depth for the Connected Car
Cybersecurity at its best is a multi-layered solution. It must be, now that everything is connected, and cyber-attacks target not only endpoint devices (cars), but backend servers and whole network ...
Emerging Data Privacy Regulation Brings OEMs and Consumers Closer Together Than Ever Before
This article discusses OEMs' significant role in protecting consumers' data privacy, and why the emerging robust regulation is actually good news for car makers around the world.
Why AI and ML Offer the Best Protection Against Cyber Attacks on Connected Cars
This article discusses how and why AI and ML technologies are needed to detect cyber threats on connected cars
The Danger of Connected Car Mobile Apps to OEMs and Smart Mobility Services
This article discusses the main risks posed by mobile apps to OEMs, connected cars, and smart mobility services. It explains the primary difficulty in protecting the mobile car app’s ...
Artificial Intelligence Automotive Cybersecurity Car fleet security Connected Car Security Machine Learning Telematics Cybersecurity Telematics Data
Going Beyond IT Cybersecurity Technologies to Protect the Connected Fleet
How can IT cybersecurity practices and technologies be adapted to the automotive world to protect connected cars?
Cutting the Lifeline to the Fleet. Not on Upstream's Watch.
If hackers gain access to the telematics’ private network they could inject remote commands to the fleet's vehicles and cut their lifeline communication.
Ten Hacks in Ten Weeks- is 2018 the Year of the Automotive Cyber Threat?
The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world's leading brands. Here’s a look at these incidents.
Infographic: Top Real-World Threats Facing Connected Cars and Fleets
Here is a snapshot of the top real-world cyber threats challenging connected car ecosystem players.
The Security Car Industry: A Disruptive Journey to a New Business Model
The automotive industry is accelerating at speed towards a technology-centric future. However, one issue dominates the connected car industry and must be addressed: cybersecurity.
Top Real-World Threats Facing Connected Cars and Fleets
Here is a snapshot of the top real-world cyber security threats highlighting the diversity of attack vectors already challenging connected car ecosystem players.
Securing the Weakest Link in Connected Cars: Telematics Data Servers
While data centers already have many security protections, none are equipped to deal with the unique challenge posed by the automotive world to automotive cybersecurity. In this post, we will ...
Automotive Cybersecurity Car fleet security Connected Car Security Fleet Cybersecurity Telematics Cybersecurity Telematics Data
Huge Risk - Fraud in the Smart Mobility Space
Much has been said about the threat cyber attacks pose to connected cars, however, there are other significant risks for companies using such vehicles
Artificial Intelligence and Automotive Fleet Security Go Hand-in-Hand
How machine learning is an effective tool for fleet security and deep insights
Artificial Intelligence Automotive Cybersecurity Car fleet security Connected Car Security Fleet Cybersecurity Machine Learning Telematics Cybersecurity Telematics Data