Resources
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2023
The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack…
Research Reports
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2023
The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
H1’2022 Automotive Cyber Trend Report
This report offers extensive coverage and analysis of automotive-specific cyber incidents across all attack vectors and their impact on the…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
2022 グローバルモビリティ サイバーセキュリティ報告書
2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を深く検証しました。報告書は公的に報告されている 900を超えるインシデントを分析し作成されています
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2022
This year’s annual Global Automotive Cybersecurity Report focuses on the automotive cyber threat landscape in light of the UNECE WP.29…
Global Automotive Cybersecurity Report 2021
Research Into Cyber Attack Trends In Light Of Cybersecurity Standards And Regulations
White Papers
- Cybersecurity
EV 充電所 拡大に向けて: EV充電所インフラ安全確保への課題
Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by…
- Cybersecurity
Leading the Charge: Securing Charging Station Infrastructures
Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by…
- Cybersecurity
Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue
There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected…
- Cybersecurity
Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats
Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.
Cybersecurity for Connected Vehicles: From Cost Centre to Value Centre
OEMs are relying on their connected vehicles to drive them from “Car Co’s” to “Tech Co’s”.
Webinars
- EV Charging Infrastructure
EV charging infrastructure: the battle of sustainability versus cybersecurity resilience
Examine the cybersecurity threats introduced by the complex electric vehicle charging landscape, the impact on different stakeholders, and the solutions…
- Vehicle SOC
From compliance to action. Is being only compliant enough for cybersecurity?
In this free, 60-minute webinar, thought leaders from Upstream, ServiceNow, and Deloitte discuss automotive cybersecurity regulatory compliance for OEMs based…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
- Vehicle SOC
2023 automotive cybersecurity strategies: new stakeholders and attack vectors emerge
In this free, 45-minute webinar, Upstream’s Shachar Azriel and Haim Kantor will discuss strategies to cope with the critical automotive…
- Cybersecurity
- Vehicle SOC
The vehicle SOC’s strategic role in connected mobility
With the number of connected vehicles expected to grow worldwide from today’s 250 million to over one billion in 2040,…
- Cybersecurity
Securing Automotive and Smart Mobility APIs
Despite OEMs and smart mobility vendors implementing advanced API security protections, API-driven attacks have tripled over the last year in…
Compliance Q&A
- Cybersecurity
- Regulatory Compliance
Relationship | ISO/SAE 21434 and WP.29 CSMS
The WP.29 regulation and the ISO/SAE standard are complementary and both look at securing modern vehicles in a similar way.…
- Cybersecurity
- Regulatory Compliance
OEM Compliance | ISO/SAE 21434 and WP.29 CSMS
Upstream Security provides an end-to-end solution for post-production monitoring as required by both the WP.29 regulation and the ISO/SAE standard. This is done using two cybersecurity…
- Cybersecurity
- Regulatory Compliance
Supply Chain Strategies | ISO/SAE 21434 and WP.29 CSMS
There are multiple possible strategies to secure the supply chain. And securing the supply chain is mandated both by the WP.29 regulation and by…
- Cybersecurity
- Regulatory Compliance
Cloud-Based Automotive Cybersecurity | ISO/SAE 21434 and WP.29 CSMS
The benefit of a cloud-based cybersecurity solution is that it’s able to secure the three primary elements of a connected vehicle. The first element…
- Cybersecurity
- Regulatory Compliance
The Challenges | ISO/SAE 21434 and WP.29 CSMS
There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.…
- Cybersecurity
- Regulatory Compliance
Cybersecurity Throughout Vehicle Lifecycle | ISO/SAE 21434 and WP.29 CSMS
Ensuring vehicle cybersecurity across its lifecycle is required both by the WP.29 regulation and by the ISO/SAE standard. And doing that is actually a challenging…
TechTalks
- Cybersecurity
- Vehicle SOC
Wipro & Upstream Combining vSOC Cybersecurity Expertise
Wipro & Upstream discuss how OEMs and stakeholders can oblige to emerging regulations and cybersecurity challenges as an outcome of…
- Cybersecurity
- Regulatory Compliance
- Vehicle SOC
Upstream & Capgemini Discuss Approaches to Monitoring the Connected Vehicle
In this “Tech Talk” video series, Upstream Security hosts diverse partners who are all top industry leaders and experts to…
- Cybersecurity
- Regulatory Compliance
Upstream & SBD Discuss Regulatory Tips for Tier-1 and 2 Suppliers
Transcript – Hi Jeffrey and welcome to Upstream’s Tech Talk Series. I’m Fay from Upstream Security, which offers a first…
- Cybersecurity
- Regulatory Compliance
Upstream & Deloitte Discuss OEM Opportunities and Obstacles Due to WP.29
Transcript – Hi, Andy and welcome to Upstream’s tech talk series. I’m Fay from Upstream Security and we offer the…
- Cybersecurity
- Regulatory Compliance
Upstream & TCS Discuss Complexities of Cybersecurity Assurance
Transcript – Hi, Sundeep and welcome to Upstream’s Tech Talk series. I’m Fay from Upstream Security and we offer the…
- Cybersecurity
- Regulatory Compliance
Upstream & IBM Discuss Securing People, Products, and Processes
Transcript – Hi, Giuseppe. Welcome to Upstream’s “Tech Talk” series. I’m Fay from Upstream Security which offers the first cloud-based…
Videos
- Cybersecurity
- Threat Intelligence
Meet the Expert: Securing APIs in the Smart Mobility Ecosystem
Daniel Blum, Product Manager at Upstream Security, discusses how context and an understanding of the automotive and smart mobility use-case…
- Cybersecurity
Meet the Expert: Enhancing SIEM Solutions for Vehicle Cybersecurity
Learn how Upstream enhances SIEM solutions by adding purpose-built detection and response capabilities for vehicle cybersecurity. Discover the benefit of…
- Cybersecurity
- Threat Intelligence
Meet the Expert: Enhancing Investigations with AutoThreat®
Daniel Blum, Product Manager at Upstream Security, shows the integration between AutoThreat® and the Upstream Platform and how this connection…
- Cybersecurity
- Vehicle SOC
ASRG @ Upstream’s vSOC: IT SOC vs. Vehicle SOC
ASRG’s John Heldreth challenges Upstream’s Giuseppe Serio to explain the difference between the IT SOCs and emerging Vehicle SOCs.
- Cybersecurity
- Vehicle SOC
ASRG @ Upstream’s vSOC: Upstream’s Cloud Approach to Protecting the Connected Vehicle Ecosystem
This is the second video in this exciting series shot in Upstream’s vSOC. In this video, ASRG’s John Heldreth deep…
Chalk Talks
Upstream’s Cybersecurity Engines
[Transcript] At the core of our Upstream C4 platform we have four cybersecurity engines that work together to protect your…
Upstream’s Contextually Aware Security Architecture
[Transcript] In this video, we’re going to talk about the architecture that we use in the Upstream C4 Platform to…
How to Leverage Upstream Platform in a SOC
[Transcript] One of the key groups that use The Upstream platform within the customer environment, is a security team within…
- Cybersecurity
- Regulatory Compliance
Advantages of Upstream’s Cloud-Based Automotive Cybersecurity
[Transcript] Upstream’s value proposition centers around our ability to protect connected vehicles, both OEMs and fleets, from remote cyber attacks.…
Upstream’s Centralized Connected Car Cybersecurity Platform
[Transcript] When we looked at the problem of how to secure a connected car, we had three goals in mind…
Solution Briefs
- Vehicle Quality
Actionable Vehicle Quality Monitoring
With Upstream for Vehicle Health & Quality Monitoring, automotive stakeholders access actionable insights relating to vehicle health across the entire…
- Threat Intelligence
Proactive Automotive Product-Centric Cyber Threat Intelligence and Risk Mitigation
AutoThreat® PRO is a premium product-centric threat intelligence solution, powered by cybersecurity researchers with deep automotive expertise and proprietary automated…
- Cybersecurity
Upstream API Security Solution Overview
Upstream’s API Security and Monitoring solution is uniquely able to understand the context of smart mobility API transactions by leveraging…
- Cybersecurity
Monitoring and Protecting Smart Mobility Services & Applications
Monitoring and Protecting Smart Mobility Services & Applications
- Cybersecurity
Monitor and Secure EV Charging Stations
The strong demand for fast and available EV charging solutions and the rapid proliferation of the complex infrastructure has introduced…
Audio
- Cybersecurity
- EV Charging Infrastructure
- Threat Intelligence
AutomotiveNews Turns the Spotlight on Cybersecurity
Upstream Security’s marketing vice president evaluates the automaker’s commitment to fighting cybersecurity threats and the double-edged sword of connectivity. White-hat…
- Cybersecurity
- Threat Intelligence
Automotive cybersecurity: A pre-requisite for connected and software-defined vehicles
The automotive industry is increasingly adopting mobility and cloud technologies, which enable seamless on-the-go experiences such as improved navigation, connectivity,…
Upstream Security Automotive Cybersecurity Report 2019- AudioBook
AudioBook
e-Books
Use Cases
Upstream Detects a Critical Vulnerability in Linux-Based Head Units
Read about how Upstream’s AutoThreat® Intelligence team works to hunt threats that are hiding in the surface, deep, and dark…
Protecting Against Telematics Servers’ Attacks
Use Case
Protecting Against Keyless Entry Attacks
Use Case
Protecting Against Security Threats on Car Sharing Services
Use Case
Protecting Against Remote Multi-Vehicle Attacks
Use Case
Japanese
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Upstream 2023 グローバルモビリティ サイバーセキュリティ報告書
弊社のサイバーセキュリティ研究者とアナリストは、2010年の時点で1,173件以上のインシデントを調査しており、それ以来、何百ものディープウェブやダークウェブのフォーラムを監視し、この包括的で実用的なレポートを作成しました。
- Cybersecurity
スマート・モビリティにおけるAPIの保護
UpstreamのAPIセキュリティおよび監視ソリューションは、自動車とサイバーの専門知識とコネクテッドカーの運転状態を階層化して、脆弱性、攻撃、構成ミス、設計上の欠陥からスマート・モビリティで使用されるAPIを保護します。Upstream独自のデジタルツインを使用してAPIを保護、監視する方法の詳細については、ここをクリックしてください。
- Cybersecurity
- Vehicle SOC
パートナーアプローチにより効果的なVSOCの構築ができます
当社のVSOCは、サイバーセキュリティ管理システム(CSMS)の重要なコンポーネントです。VSOCをお客様自身で社内で管理する場合でも、弊社や導入パートナー企業と一緒に構築する場合でも、当社のBuild (構築)、Operate(運用)、Transfer( 稼働後のVSOCの移譲) BOTモデルは、WP29などの規制上の懸念に対応します。最新のコネクテッドカーに必要な自動車固有のサイバー脅威情報に基づいて、サイバーセキュリティー対策に必要なソリューションをお客様のご要望に応じて柔軟に提供します。 詳細につきましてはこちらからお問い合わせください。
- Cybersecurity
- Insurance
- Regulatory Compliance
- Vehicle Quality
- Vehicle SOC
アップストリームプラットフォームとは
アップストリームプラットフォームは、コネクテッドカー向けのサイバーセキュリティおよびデータ管理プラットフォームです。これは、モビリティ産業に携わる皆様がデータに見られる潜在的な価値を活用して、コネックテッドカー、フリート事業、およびその他のサービスを保護、最適化、強化、およびさらに収益化できるようにすることを目的としています。実際のデモをご覧になりたい方は、こちらからお申し込みください デモを申し込む
- Cybersecurity
- Regulatory Compliance
アップストリーム・プラットフォームはWP.29 & ISO/SAE 21434 準拠にどのように役立ちますか?
当社の高度なエージェントレス・サイバーセキュリティ・ソリューションは、既存のテレマティクス・データストリームに基づいてクラウド上に構築されるため、短期間でWP.29およびISO/SAE21434に準拠した形で車両を保護できます。弊社のプラットフォームが稼働すれば、新車だけではなく、すでに走行している車両にもサイバー攻撃からの保護に迅速に対応できます。商用車および乗用車向けにアップストリームプラットフォームが選ばれる理由は、専用の車両デジタルツインによるサイバーリスクの検出と車両の走行状態管理にあります。各車両ごとのデジタル表現は、車両、そして車両外からの複数のデータソースを組み合わせて、任意の時点で対象車両の状態をVSOCに提供できます。 アップストリーム・プラットフォームは、アップストリームの業界をリードする脅威インテリジェンスプラットフォームであるAutoThreatから得られる脅威情報を組み込むことにより、絶えず変化する脅威の状況を最新の状態で維持します。フォルスポジティブ(誤検知)を減らし、フォルスポジティブ゙を防ぐ高度な検出を適用する機能により、VSOC内の効果的な応答の自動化が可能になります。弊社のプラットフォームはコネクテッドカー本体とその通信チャネル、バックエンドシステムも含め保護します。詳細に関しましては、こちらからお問い合わせください