Resources
Research Reports
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
2022 グローバルモビリティ サイバーセキュリティ報告書
2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を深く検証しました。報告書は公的に報告されている 900を超えるインシデントを分析し作成されています
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
Global Automotive Cybersecurity Report 2022
This year’s annual Global Automotive Cybersecurity Report focuses on the automotive cyber threat landscape in light of the UNECE WP.29…
Global Automotive Cybersecurity Report 2021
Research Into Cyber Attack Trends In Light Of Cybersecurity Standards And Regulations
Global Automotive Cybersecurity Report 2020
Prepare for Today’s Threats in the Smart Mobility Ecosystem
Mid-Year Report: H1 2019 Automotive Cyber Incidents Surpass All of 2018
Mid-Year Research Report
White Papers
- Cybersecurity
Leading the Charge: Securing Charging Station Infrastructures
Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by…
- Cybersecurity
Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue
There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected…
- Cybersecurity
Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats
Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.
Cybersecurity for Connected Vehicles: From Cost Centre to Value Centre
OEMs are relying on their connected vehicles to drive them from “Car Co’s” to “Tech Co’s”.
- Cybersecurity
- Regulatory Compliance
Upstream Receives 2021 Best Practices Technology Innovation Award in the fields of Connected Vehicle Analytics and Cybersecurity
Learn more about how you can leverage the wealth of data from connected cars
Webinars
- Compliance
- Cybersecurity
Watch: Driving Automotive Cyber Resilience From Suppliers to OEMs
Watch as we answer: In today’s heightened automotive cybersecurity capabilities, why are black-hat attacks so common?
- Compliance
- Cybersecurity
- Vehicle SOC
Webinar: Real-World Experiences in Building and Operating a VSOC
In this Webinar, Ford’s Manager Vehicle and Mobility Cybersecurity, Darren Shelcusky speak with Upstream’s VSOC Director, Yaniv Maimon, and Giuseppe…
Watch: How Compliance will Make or Break it for Tier 1 and Tier 2 Suppliers
Watch the third webinar in our standards and regulations series, a live discussion with Giuseppe Serio, Upstream’s Senior Director of…
- Cybersecurity
- Regulatory Compliance
- Vehicle SOC
Livestream Webinar: The Regulations Warned. We Tracked
Watch our ASRG webinar “They Warned. We Tracked: The WP.29 Regulation As Seen Through Real-Life Cyber Attacks” to hear from…
Watch: Understanding Cyber threats Targeting Your Fleet and Protecting Your Vehicle
Allan Konar discusses cyber threats facing the connected fleet and trucking industry and how to secure against them.
Compliance Q&A
- Cybersecurity
- Regulatory Compliance
Relationship | ISO/SAE 21434 and WP.29 CSMS
The WP.29 regulation and the ISO/SAE standard are complementary and both look at securing modern vehicles in a similar way.…
- Cybersecurity
- Regulatory Compliance
OEM Compliance | ISO/SAE 21434 and WP.29 CSMS
Upstream Security provides an end-to-end solution for post-production monitoring as required by both the WP.29 regulation and the ISO/SAE standard. This is done using two cybersecurity…
- Cybersecurity
- Regulatory Compliance
Supply Chain Strategies | ISO/SAE 21434 and WP.29 CSMS
There are multiple possible strategies to secure the supply chain. And securing the supply chain is mandated both by the WP.29 regulation and by…
- Cybersecurity
- Regulatory Compliance
Cloud-Based Automotive Cybersecurity | ISO/SAE 21434 and WP.29 CSMS
The benefit of a cloud-based cybersecurity solution is that it’s able to secure the three primary elements of a connected vehicle. The first element…
- Cybersecurity
- Regulatory Compliance
The Challenges | ISO/SAE 21434 and WP.29 CSMS
There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.…
- Cybersecurity
- Regulatory Compliance
Cybersecurity Throughout Vehicle Lifecycle | ISO/SAE 21434 and WP.29 CSMS
Ensuring vehicle cybersecurity across its lifecycle is required both by the WP.29 regulation and by the ISO/SAE standard. And doing that is actually a challenging…
TechTalks
- Cybersecurity
- Regulatory Compliance
- Vehicle SOC
Upstream & Capgemini Discuss Approaches to Monitoring the Connected Vehicle
In this “Tech Talk” video series, Upstream Security hosts diverse partners who are all top industry leaders and experts to…
Upstream & SBD Discuss Regulatory Tips for Tier-1 and 2 Suppliers
Transcript – Hi Jeffrey and welcome to Upstream’s Tech Talk Series. I’m Fay from Upstream Security, which offers a first…
Upstream & Deloitte Discuss OEM Opportunities and Obstacles Due to WP.29
Transcript – Hi, Andy and welcome to Upstream’s tech talk series. I’m Fay from Upstream Security and we offer the…
Upstream & TCS Discuss Complexities of Cybersecurity Assurance
Transcript – Hi, Sundeep and welcome to Upstream’s Tech Talk series. I’m Fay from Upstream Security and we offer the…
Upstream & IBM Discuss Securing People, Products, and Processes
Transcript – Hi, Giuseppe. Welcome to Upstream’s “Tech Talk” series. I’m Fay from Upstream Security which offers the first cloud-based…
Upstream & Thales Discuss Cybersecurity for Smart Mobility
Transcript – Hi Jean-Marie, and welcome to Upstream’s Tech Talk series. I’m Fay from Upstream Security – Hi, Fay. –…
Videos
- Cybersecurity
- Threat Intelligence
What is Upstream’s AutoThreat® Intelligence?
Upstream’s AutoThreat® Intelligence is the automotive industry’s leading cyber threat intelligence and risk assessment solution. It is purpose-built to collect,…
- Cybersecurity
- Threat Intelligence
How AutoThreat® Supports Automotive Cybersecurity
AutoThreat’s® automotive-focused analysts scour the surface, deep, and dark web for incidents that matter most to the automotive ecosystem. Together,…
- Cybersecurity
- Regulatory Compliance
How does the Upstream Platform help with WP.29 & ISO/SAE 21434 compliance?
Our advanced agentless automotive cybersecurity solution is rapidly deployed and based on existing telematics data streams, so you can comply…
- Cybersecurity
- Vehicle SOC
Building an Effective VSOC With A Partner Approach
Our VSOC is a key component in any Cybersecurity Management System (CSMS). Whether managing your VSOC in-house or looking to…
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
- Vehicle SOC
What is Upstream currently doing in the VSOC operation space?
Upstream’s VSOC analyzes and contextualizes real-time automotive data to develop an automotive-specific security operations center for today’s most advanced private,…
Chalk Talks
Upstream’s Cybersecurity Engines
[Transcript] At the core of our Upstream C4 platform we have four cybersecurity engines that work together to protect your…
Upstream’s Contextually Aware Security Architecture
[Transcript] In this video, we’re going to talk about the architecture that we use in the Upstream C4 Platform to…
How to Leverage Upstream Platform in a SOC
[Transcript] One of the key groups that use The Upstream platform within the customer environment, is a security team within…
- Compliance
- Cybersecurity
Advantages of Upstream’s Cloud-Based Automotive Cybersecurity
[Transcript] Upstream’s value proposition centers around our ability to protect connected vehicles, both OEMs and fleets, from remote cyber attacks.…
Upstream’s Centralized Connected Car Cybersecurity Platform
[Transcript] When we looked at the problem of how to secure a connected car, we had three goals in mind…
Solution Briefs
- Vehicle SOC
The Leading Managed Vehicle SOC: Actively Protecting Millions of Vehicles for OEMs Worldwide
Protect automotive cybersecurity with an automotive-specific Vehicle Security Operations Center (VSOCs) to address the complexity of cyberattacks targeting OT networks,…
- Cybersecurity
- Data Quality Validation
Beyond Cyber: Upstream Puts Data in Motion
Automotive data in the cloud breaks silos, allowing teams to analyze information in the pursuit of identifying exciting new revenue…
The Vehicle SOC
Solution Brief
Cybersecurity Engines
Solution Brief
Cloud-Based Automotive Cybersecurity
Solution Brief
e-Books
Use Cases
Upstream Detects a Critical Vulnerability in Linux-Based Head Units
Read about how Upstream’s AutoThreat® Intelligence team works to hunt threats that are hiding in the surface, deep, and dark…
Protecting Against Telematics Servers’ Attacks
Use Case
Protecting Against Keyless Entry Attacks
Use Case
Protecting Against Security Threats on Car Sharing Services
Use Case
Protecting Against Remote Multi-Vehicle Attacks
Use Case
Japanese
- Cybersecurity
- Regulatory Compliance
- Threat Intelligence
2022 グローバルモビリティ サイバーセキュリティ報告書
2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を深く検証しました。報告書は公的に報告されている 900を超えるインシデントを分析し作成されています
- Compliance
- Cybersecurity
- Vehicle SOC
Upstream Securityの自動車AutoThreat
High-level overview of Upstream’s Security Vehicle AutoThreat
効果的な自動車のサイバーセキュリティマネジメント、検出、およびレスポンスシステムを設計および運用する方法
効果的な車両SOCのためのSIEMソリューションの統合
見る: サイバー脅威が変化する状況下で、今後の自動車サイバーセキュリティ規制に準拠していく方法
This webinar is Part 1 of our webinar series focusing on the ISO/SAE 21434 and the WP.29 regulations
自動車用SOC ソリューション概要
Vehicle SOC Solution Brief. Japanese Version.