Resources
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Upstream’s H1 2023 Automotive Cyber Trend Report
This report focuses on the 1st half of 2023 and sheds light on key trends and emerging cybersecurity threats that…
Research Reports
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Upstream’s H1 2023 Automotive Cyber Trend Report
This report focuses on the 1st half of 2023 and sheds light on key trends and emerging cybersecurity threats that…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2023
The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
H1’2022 Automotive Cyber Trend Report
This report offers extensive coverage and analysis of automotive-specific cyber incidents across all attack vectors and their impact on the…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
2022 グローバルモビリティ サイバーセキュリティ報告書
2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を深く検証しました。報告書は公的に報告されている 900を超えるインシデントを分析し作成されています
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2022
This year’s annual Global Automotive Cybersecurity Report focuses on the automotive cyber threat landscape in light of the UNECE WP.29…
White Papers
- Cybersecurity
EV 充電所 拡大に向けて: EV充電所インフラ安全確保への課題
Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by…
- Cybersecurity
Leading the Charge: Securing Charging Station Infrastructures
Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by…
- Cybersecurity
Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue
There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected…
- Cybersecurity
Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats
Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.
Cybersecurity for Connected Vehicles: From Cost Centre to Value Centre
OEMs are relying on their connected vehicles to drive them from “Car Co’s” to “Tech Co’s”.
Webinars
- Cybersecurity
ABeam & Upstream webinar: Emerging cybersecurity risks in automotive, manufacturing & smart mobility
The introduction of connected and Software Defined Vehicles is introducing many digital and business opportunities. Yet at the same time…
- API Security
Turbocharging API security to combat car hacking
Attacks targeting APIs are among the most serious threats facing connected vehicles and fleets. API-based attacks often result in large-scale…
- API Security
Contextual API security – Protecting vehicle fleet infrastructure and critical data
APIs are powerful innovation enablers…and also prime targets for cybersecurity attacks. In this webinar, experts from AWS and Upstream explain why API…
- API Security
Apidays Interface 2023 – Fast & Furious: Hacking cars with APIs
Watch the session Fast & Furious: Hacking Cars with APIs with Shira Sarid-Hausireer, Upstream's VP of Marketing, and Daniel Blum,…
- Cybersecurity
Software-defined vehicles: the promise and the emerging cyber threats
In this free webinar, Upstream’s Shachar Azriel and AutoMobility Advisors’ Chip Goetzinger discuss recent cyber attacks on SDVs and explain how an…
Compliance Q&A
- Cybersecurity
- Regulatory Compliance
Relationship | ISO/SAE 21434 and WP.29 CSMS
The WP.29 regulation and the ISO/SAE standard are complementary and both look at securing modern vehicles in a similar way.…
- Cybersecurity
- Regulatory Compliance
OEM Compliance | ISO/SAE 21434 and WP.29 CSMS
Upstream Security provides an end-to-end solution for post-production monitoring as required by both the WP.29 regulation and the ISO/SAE standard. This is done using two cybersecurity…
- Cybersecurity
- Regulatory Compliance
Supply Chain Strategies | ISO/SAE 21434 and WP.29 CSMS
There are multiple possible strategies to secure the supply chain. And securing the supply chain is mandated both by the WP.29 regulation and by…
- Cybersecurity
- Regulatory Compliance
Cloud-Based Automotive Cybersecurity | ISO/SAE 21434 and WP.29 CSMS
The benefit of a cloud-based cybersecurity solution is that it’s able to secure the three primary elements of a connected vehicle. The first element…
- Cybersecurity
- Regulatory Compliance
The Challenges | ISO/SAE 21434 and WP.29 CSMS
There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.…
- Cybersecurity
- Regulatory Compliance
Cybersecurity Throughout Vehicle Lifecycle | ISO/SAE 21434 and WP.29 CSMS
Ensuring vehicle cybersecurity across its lifecycle is required both by the WP.29 regulation and by the ISO/SAE standard. And doing that is actually a challenging…
Videos
- API Security
Embracing Next-Gen API Security with Upstream
Upstream has introduced the next-generation solution for API Security, purpose-built for the transportation and mobility ecosystem.
- API Security
AWS & Upstream Recorded Session – Contextual API Security
APIs are powerful innovation enablers, but also a prime target for cybersecurity attacks. At IAA 2023, Omar Zoma, Sr. Security…
- API Security
Meet the Expert: Updates to OWASP API Security Top 10
Michael Kan-Tor from Upstream Research covers the recent updates to the OWASP API Security Top Ten risks. Reviewing all ten…
- API Security
- Cybersecurity
- Threat Intelligence
Meet the Expert: Securing APIs in the Smart Mobility Ecosystem
Daniel Blum, Product Manager at Upstream Security, discusses how context and an understanding of the automotive and smart mobility use-case…
- Cybersecurity
Meet the Expert: Enhancing SIEM Solutions for Vehicle Cybersecurity
Learn how Upstream enhances SIEM solutions by adding purpose-built detection and response capabilities for vehicle cybersecurity. Discover the benefit of…
TechTalks
- Cybersecurity
- Vehicle SOC
TCS & Upstream: Ensuring and Maintaining Data Privacy in VSOCs
TCS & Upstream discuss about the challenges around connected vehicles data in vSOC.
- Cybersecurity
- Vehicle SOC
Wipro & Upstream Combining vSOC Cybersecurity Expertise
Wipro & Upstream discuss how OEMs and stakeholders can oblige to emerging regulations and cybersecurity challenges as an outcome of…
- Cybersecurity
- Regulatory Compliance
- Vehicle SOC
Upstream & Capgemini Discuss Approaches to Monitoring the Connected Vehicle
In this “Tech Talk” video series, Upstream Security hosts diverse partners who are all top industry leaders and experts to…
- Cybersecurity
- Regulatory Compliance
Upstream & SBD Discuss Regulatory Tips for Tier-1 and 2 Suppliers
Transcript – Hi Jeffrey and welcome to Upstream’s Tech Talk Series. I’m Fay from Upstream Security, which offers a first…
- Cybersecurity
- Regulatory Compliance
Upstream & Deloitte Discuss OEM Opportunities and Obstacles Due to WP.29
Transcript – Hi, Andy and welcome to Upstream’s tech talk series. I’m Fay from Upstream Security and we offer the…
- Cybersecurity
- Regulatory Compliance
Upstream & TCS Discuss Complexities of Cybersecurity Assurance
Transcript – Hi, Sundeep and welcome to Upstream’s Tech Talk series. I’m Fay from Upstream Security and we offer the…
Solution Briefs
- Cybersecurity
Automotive Cybersecurity Data Sheet
- Fraud
Automotive Fraud Management Product Sheet
Monitor and detect fraudulent activities targeted to bypass subscription fees, gain access to premium features, and manipulate vehicles for warranty-related…
- API Security
API Security for Fleet Management Platforms
Upstream’s API Security Is Purpose-Built to Protect Business Operations, Applications and Services
- API Security
API Security Product Sheet
Upstream’s API Security solution is uniquely designed to correlate between API traffic and the contextual impact they have on operational…
- Vehicle Quality
Actionable Vehicle Quality Monitoring
With Upstream for Vehicle Health & Quality Monitoring, automotive stakeholders access actionable insights relating to vehicle health across the entire…
Case Studies
Use Cases
Upstream Detects a Critical Vulnerability in Linux-Based Head Units
Read about how Upstream’s AutoThreat® Intelligence team works to hunt threats that are hiding in the surface, deep, and dark…
Protecting Against Telematics Servers’ Attacks
Use Case
Protecting Against Keyless Entry Attacks
Use Case
Protecting Against Security Threats on Car Sharing Services
Use Case
Protecting Against Remote Multi-Vehicle Attacks
Use Case
Chalk Talks
Upstream’s Cybersecurity Engines
[Transcript] At the core of our Upstream C4 platform we have four cybersecurity engines that work together to protect your…
Upstream’s Contextually Aware Security Architecture
[Transcript] In this video, we’re going to talk about the architecture that we use in the Upstream C4 Platform to…
How to Leverage Upstream Platform in a SOC
[Transcript] One of the key groups that use The Upstream platform within the customer environment, is a security team within…
- Cybersecurity
- Regulatory Compliance
Advantages of Upstream’s Cloud-Based Automotive Cybersecurity
[Transcript] Upstream’s value proposition centers around our ability to protect connected vehicles, both OEMs and fleets, from remote cyber attacks.…
Upstream’s Centralized Connected Car Cybersecurity Platform
[Transcript] When we looked at the problem of how to secure a connected car, we had three goals in mind…
Podcasts
- Cybersecurity
Cybersecurity for Transportation
Transport Topics’ Dan Ronan hosted Upstream’s CEO Yoav Levy to discuss transportation security from a cyber aspect. Some key takeaways: In a world of…
- Cybersecurity
- EV Charging Infrastructure
- Threat Intelligence
AutomotiveNews Turns the Spotlight on Cybersecurity
Upstream Security’s marketing vice president evaluates the automaker’s commitment to fighting cybersecurity threats and the double-edged sword of connectivity. White-hat…
- Cybersecurity
- Threat Intelligence
Automotive cybersecurity: A pre-requisite for connected and software-defined vehicles
The automotive industry is increasingly adopting mobility and cloud technologies, which enable seamless on-the-go experiences such as improved navigation, connectivity,…
Upstream Security Automotive Cybersecurity Report 2019- AudioBook
AudioBook
e-Books
Japanese
Upstream Platform – Demo (JP)
- Cybersecurity
- Threat Intelligence
- Vehicle SOC
車両やフリートをサイバーセキュリティ攻撃やリスクから保護
この 40 分間の無料ウェビナーでは、OEM・Tier-1・および商用フリートが、サイバー攻撃によって車両の安全性・顧客の信頼・ビジネス継続性が影響を受ける前に、自社の車両フリートをどのように保護できるかについて、Upstream の専門家が話します。
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Upstream 2023 グローバルモビリティ サイバーセキュリティ報告書
弊社のサイバーセキュリティ研究者とアナリストは、2010年の時点で1,173件以上のインシデントを調査しており、それ以来、何百ものディープウェブやダークウェブのフォーラムを監視し、この包括的で実用的なレポートを作成しました。
- Cybersecurity
スマート・モビリティにおけるAPIの保護
UpstreamのAPIセキュリティおよび監視ソリューションは、自動車とサイバーの専門知識とコネクテッドカーの運転状態を階層化して、脆弱性、攻撃、構成ミス、設計上の欠陥からスマート・モビリティで使用されるAPIを保護します。Upstream独自のデジタルツインを使用してAPIを保護、監視する方法の詳細については、ここをクリックしてください。
- Cybersecurity
- Vehicle SOC
パートナーアプローチにより効果的なVSOCの構築ができます
当社のVSOCは、サイバーセキュリティ管理システム(CSMS)の重要なコンポーネントです。VSOCをお客様自身で社内で管理する場合でも、弊社や導入パートナー企業と一緒に構築する場合でも、当社のBuild (構築)、Operate(運用)、Transfer( 稼働後のVSOCの移譲) BOTモデルは、WP29などの規制上の懸念に対応します。最新のコネクテッドカーに必要な自動車固有のサイバー脅威情報に基づいて、サイバーセキュリティー対策に必要なソリューションをお客様のご要望に応じて柔軟に提供します。 詳細につきましてはこちらからお問い合わせください。