From a Single TCU to Full Control

Take a Deeper Look: This review offers deeper visibility into a pertinent automotive cyber risk and offers insight into potential mitigations.

Understanding the UNECE WP.29 Cybersecurity Regulation (CSMS)

[Blog] On June 25, 2020, after roughly two years of preparations and revisions, the United Nations formally adopted two new regulations on automotive cybersecurity.

ISO/SAE 21434: Setting the Standard for Automotive Cybersecurity

[Blog] Understanding the ISO/SAE 21434 draft standard and Upstream Security’s solutions for effective compliance in the realm of automotive cybersecurity

Upstream - $30M Series B for Shifting into High Gear

[Blog | by Yoav Levy, CEO and Co-founder] Today, we’re announcing the closing of our Series B of funding of $30 million, bringing together a global syndicate of some of the ...

How to Protect Against Telematics Server Attacks

A blog discussing telematics server attacks, how hackers find and take advantage of this vulnerability, and how companies can prevent them from reoccurring

How to Mitigate Keyless Entry Attacks

A blog discussing the growing crime phenomenon of keyless entry attacks and how Upstream Security can mitigate them

Automotive Cyber Incidents in H1 2019 Already Surpass All of 2018

A blog delving into the rapid increase in the number of incidents when comparing H1 2019 to the whole of 2018

How to Protect Against Hacks on Car Sharing Services

A blog delving into the case of theft with Daimler Car2Go app, and how to protect against such hacks on car-sharing services

How to Protect Against Remote Multi-Vehicle Attacks

A blog delving into how hackers are gaining access to thousands of cars worldwide and how Upstream's C4 platform helps to protect against remote multi-vehicle attacks

Q1 2019 Sees a Rapid Growth of Automotive Cyber Incidents

A detailed blog taking a deep look into the increase of automotive cyberattacks when comparing Q1 2018 to Q1 2019

3 Approaches to Building a Vehicle Security Operations Center

This blog takes a look into the necessity for building a Vehicle Security Operations Center for large OEMs and how to leverage Upstream’s Automotive Cybersecurity C4 platform
Automotive Cybersecurity automotive security connected car connected car security telematics data Vehicle security operations center VSOC

The Hidden Cyber Risks of Electric Vehicles

A blog taking into consideration the security factors that are facing electric vehicles, and how to stay on top of these risks.

The Power of an Analytics Platform Built for Smart Mobility

Big data analytics is table stakes these days in the business world. To date, Smart Mobility is only scratching the surface of the value to be found in their existing ...

The Business Impact of Weak Security for OEMs

For OEMs, staying on top of security can be a huge business advantage. From regulatory liability to brand damage- how to stay ahead of the competition?

Backend Connected Vehicle Attacks are Taking the Lead

Is the world of cyber-security offering the automotive industry enough protection? Endpoint in-vehicle security alone is not enough.

From Selling Cars to Selling Services- OEMs' Challenges in Securing Complex Data Environments

The rise of the connected car is changing car companies, opening opportunities for OEMs to move into new service models altogether. But connectivity also brings about new cyber risks. How ...

“Talk to our TSP” is not gonna cut it – Fleets Need to Take Responsibility for Their Own Security

Regardless of what the TSPs, cloud companies and cellular providers are doing – it’s time to take control of your own ecosystem.

Cyber-Crime is a Reality in Smart Cities: How Can We Protect Connected Transportation?

Connected transportation in our smart cities makes our daily lives easier and more enjoyable. But more connectivity means more cyber threats, and when a single attack can put an entire ...

A Cybersecurity ‘Glitch’ in the Growing Telematics Insurance Trend

Insurance telematics provides today’s drivers with reduced costs and value-added services, however, it also presents insurers with the challenge faced by every stakeholder in the connected car ecosystem – an ...

Ready to Keep Up with Smart Mobility? The Effects of Connectivity on the MaaS Ecosystem

The automotive industry is undergoing rapid transformation and becoming a smart mobility ecosystem and with it the cyber-attacks surface is expanding, demanding new security standards. This blog explains why smart ...

The Greatest Competitive Advantage for Telematics Service Providers Today - Securing the Connected Car

Cybers threats and data privacy concerns haven’t skipped the TSPs (Telematics Service Providers). The telematics backend servers that enable fleets to be connected, run, analyze, and use the car-generated ...

Cybersecurity Regulation in the Automotive Industry - Who is Responsible for Protecting the Connected Car?

Regulation is slowly catching up with connected car technologies. However, unique complexities in the automotive industry leave a few issues unresolved, namely, who is responsible for protecting the connected car? ...
Automotive Cybersecurity automotive cybersecurity standards automotive security connected car connected car security cybersecurity regulations Telematics Cybersecurity telematics data

Connected Car-Fleets are in Immediate Risk of Cyber Attacks. Here’s What You Can Do About it

There's not a minute to waste - connected car fleets using telematics devices on the road today are in immediate risk of a breach and need cyber protection now! Here's ...

Running the Telematics Service for Your Connected Fleet? Here's what you need to know

The very same car-generated data used to monitor and report the vehicle's tire pressure, can so easily be exploited to hack into its telematics backend servers. Securing telematics data- it ...

The First Step to Securing the Automotive Cloud – A Single Source of Truth

Creating a single source of truth by collecting the entire gathered data under one roof, allows to piece together a holistic, centralized view of the entire connected car's ecosystem and ...

Defense in Depth for the Connected Car

Cybersecurity at its best is a multi-layered solution. It must be, now that everything is connected, and cyber-attacks target not only endpoint devices (cars), but backend servers and whole network ...

Last Week in Tel Aviv Was all About Smart Transportation and Securing Connected Mobility

This past week in Tel Aviv has proved once again that the future of the automotive industry lies in connectivity, mobility as a service, and advanced cybersecurity. This blog is ...

Emerging Data Privacy Regulation Brings OEMs and Consumers Closer Together Than Ever Before

This article discusses OEMs' significant role in protecting consumers' data privacy, and why the emerging robust regulation is actually good news for car makers around the world.

Why AI and ML Offer the Best Protection Against Cyber Attacks on Connected Cars

This article discusses how and why AI and ML technologies are needed to detect cyber threats on connected cars

The Danger of Connected Car Mobile Apps to OEMs and Smart Mobility Services

This article discusses the main risks posed by mobile apps to OEMs, connected cars, and smart mobility services. It explains the primary difficulty in protecting the mobile car app’s ...
artificial intelligence Automotive Cybersecurity automotive fleet security connected car connected car cybersecurity connected car security machine learning Telematics Cybersecurity telematics data

Redefining Connected Car Cybersecurity

Cybersecurity is a business risk, not just an IT problem. Learn what makes Upstream's automotive cybersecurity solution so unique.

Going Beyond IT Cybersecurity Technologies to Protect the Connected Fleet

How can IT cybersecurity practices and technologies be adapted to the automotive world to protect connected cars?

Cutting the Lifeline to the Fleet. Not on Upstream's Watch.

If hackers gain access to the telematics’ private network they could inject remote commands to the fleet's vehicles and cut their lifeline communication.

Ten Hacks in Ten Weeks- is 2018 the Year of the Automotive Cyber Threat?

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world's leading brands. Here’s a look at these incidents.

Infographic: Top Real-World Threats Facing Connected Cars and Fleets

Here is a snapshot of the top real-world cyber threats challenging connected car ecosystem players.

The Car Industry: A Disruptive Journey to a New Business Model

The automotive industry is accelerating at speed towards a technology-centric future. However, one issue dominates the connected car industry and must be addressed: cybersecurity.

No Longer on Cloud Nine: Top Real-World Threats Facing Connected Cars and Fleets

Here is a snapshot of the top real-world cyber security threats highlighting the diversity of attack vectors already challenging connected car ecosystem players.

The Keys to Securing Automotive Fleets: KPMG Report

KPMG recently released their report, ‘Protecting the fleet – and the car business’. It highlights the need to adopt a new automotive security framework.

Securing the Weakest Link in Connected Cars: Telematics Servers

While data centers already have many security protections, none are equipped to deal with the unique challenge posed by the automotive world to automotive cybersecurity. In this post, we will ...
Automotive Cybersecurity automotive fleet security automotive security connected car connected car cybersecurity connected car security Fleet Cybersecurity fleets Telematics Cybersecurity telematics data

Huge Risk - Fraud in the Smart Mobility Space

Much has been said about the threat cyber attacks pose to connected cars, however, there are other significant risks for companies using such vehicles

Artificial Intelligence and Automotive Fleet Security Go Hand-in-Hand

How machine learning is an effective tool for fleet security and deep insights
artificial intelligence Automotive Cybersecurity automotive fleet security automotive industry connected car connected car security Fleet Cybersecurity fleets machine learning Telematics Cybersecurity telematics data

Fleet Security: The Sum of All Car Hacking Fears

The fleet-wide hack is a real threat to connected car fleets. Read more to learn why.

What Does the GDPR Have to Do with Car OEMs?

Check out these 5 Insights for a smooth regulatory ride.