Upstream Security and Volta Team Up to Safeguard the Future of Electric Fleets

We recently partnered with Volta to keep Maureen, the impressive Volta Zero truck, safe and sound on the journey from London to Geneva as part of the EV Rally Club!

Ensuring driver safety, vehicle safety, and cybersecurity resilience is a top priority for Volta. We’re thrilled to support this commitment and showcase how our collaboration with Volta elevates cybersecurity for the future of sustainable mobility.

Here’s to a safe and successful journey!

Read the PR

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Cybersecurity and compliance in the age of autonomy

As autonomous technologies advance toward Levels 3-4, securing these innovative systems requires a unique product cybersecurity approach.

More Details

Podcast by Sonatus: Navigating Cybersecurity Threats in the Automotive Industry

Auto Tech Detroit 2024 highlighted the pressing issue of cybersecurity in the automotive ecosystem. Recorded live during the event, John Heinlein, CMO of Sonatus, had…

More Details

H1’2024 Report: Redefining Automotive & Smart Mobility IoT Cyber Risks

SIM-enabled IoT devices, primarily in the automotive and smart mobility ecosystem, have evolved into critical infrastructure, redefining cyber risks and requiring stakeholders to ensure safety,&hellip

More Details

Watch: Redefining automotive and smart mobility IoT cyber risks

The mobility ecosystem has identified a clear priority in accelerating the adoption of electric vehicles (EVs). However, as the proliferation of EVs deepens, new challenges…

More Details

Securing Identities in the Future of Mobility and Beyond

Discover how a vehicle-centric approach to identity management can revolutionize the automotive industry, enhance user experiences, and protect sensitive data.

More Details

Redefining automotive and smart mobility IoT cyber risks

SIM-enabled IoT devices, primarily in the automotive and smart mobility ecosystem, have evolved into critical infrastructure, redefining cyber risks and requiring stakeholders to ensure safety,&hellip

More Details
Skip to content