Research Reports

Research Reports

H1’2024 Report: Redefining Automotive & Smart Mobility IoT Cyber Risks
  • Cybersecurity
  • IoT Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

H1’2024 Report: Redefining Automotive & Smart Mobility IoT Cyber Risks

SIM-enabled IoT devices, primarily in the automotive and smart mobility ecosystem, have evolved into critical infrastructure, redefining cyber risks and requiring stakeholders to ensure safety,…

Read More
Infographic: The Automotive Cybersecurity Inflection Point 2024 Report
  • Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

Infographic: The Automotive Cybersecurity Inflection Point 2024 Report

The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack vectors.

Read More
2024 グローバル自動車サイバーセキュリティレポートUpstreamのグローバル自動車
  • Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

2024 グローバル自動車サイバーセキュリティレポートUpstreamのグローバル自動車

サイバーセキュリティレポートは、自動車サイバーセキュリティの状況に関する包括的な概要を提供します。Upstreamの研究者が数百件の自動車サイバーインシデント(過去10年間で1468件、2023年だけで295件)を分析し、数年先に渡る実用的なインサイトと予測を提供します。

Read More
Global Automotive Cybersecurity Report 2024
  • Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

Global Automotive Cybersecurity Report 2024

The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack vectors.

Read More
Upstream’s H1 2023 Automotive Cyber Trend Report
  • Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

Upstream’s H1 2023 Automotive Cyber Trend Report

This report focuses on the 1st half of 2023 and sheds light on key trends and emerging cybersecurity threats that the Upstream Research Team has…

Read More
Global Automotive Cybersecurity Report 2023
  • Cybersecurity
  • Regulatory Compliance
  • Threat Intelligence

Global Automotive Cybersecurity Report 2023

The Automotive industry is rapidly expanding into a vast smart mobility ecosystem, introducing new levels of cyber sophistication and attack vectors.

Read More
Skip to content