The Upstream Blog
- Connected Vehicle
- Cybersecurity
- Threat Intelligence
Flipper Zero and the Rise of “Unleashed 2.0”: Why Automotive Cybersecurity Needs to Look Beyond the Perimeter
Vehicles increasingly rely on wireless technologies, from RFID and Sub-GHz radio signals used in remote keyless entry and ignition to NFC-based digital keys in newer…
- Cybersecurity
When Grey-Market Loopholes Leave Cars Open to Ransom
Imagine buying a brand-new connected vehicle, only to wake up one morning locked out of it. The app on your phone no longer works. The…
- Proactive Quality Detection
When ADAS and Cruise Control Go Dark: AI Delivers a Breakthrough to Resolve a Chronic Failure
This is the final blog in a spotlight series showcasing real-life case studies of OEMs who were able to utilize their connected vehicle data, powered…
- Cybersecurity
- EV Charging
Beyond the Cyber Resilience Act: Building Cyber Resilience for the EV Charging Ecosystem
Combining Cyber Threat Intelligence, Real-Time Detection, and Expert Response for Unified Compliance with CRA The European Cyber Resilience Act (CRA), adopted in October 2024, is…
- Cybersecurity
Beyond the Cyber Resilience Act: Building Holistic Cyber Resilience
Combining Threat Intelligence, Real-Time Detection, and Expert Response for Unified CRA Compliance In a world where digital products are increasingly embedded in everyday life, from…
- Proactive Quality Detection
Avoiding Déjà Vu: How OEMs Can Stop Known Quality Failures From Resurfacing
This is the third blog in a spotlight series showcasing real-life case studies of OEMs who were able to utilize their connected vehicle data, powered…
- Proactive Quality Detection
When Symptoms Don’t Match the Root Cause: Uncovering a Global Active Grille Shutter Failure
This is the second blog in a spotlight series showcasing real-life case studies of OEMs who were able to utilize their connected vehicle data, powered…