Blog

Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles

Over the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex software required to run these vehicles all sits on top of firmware, which has been facing an…

Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation

This is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps, and finally, this part explains why you need…
Interior of autonomous car. Car digitalization concept.

The Top 5 Autonomous Vehicle Security Gaps

This is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 reviews attack vectors, and this article addresses security gaps. Finally, part 4 explains why you need development…

Autonomous Vehicle Hacking: Exploring Potential Attack Vectors

This is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. This part and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…

Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack

This is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…

Firmware Protection: How to Solve for Firmware Security Gaps

Device and chip makers have an obligation to improve their firmware protection to defend against threats. If nothing else, they need to defend themselves. Selling products that are later revealed to have vulnerabilities is expensive and bad…

Firmware Hacking: Exploring Potential Security Gaps and Vulnerabilities

Firmware is in every computing device. Therefore, every device is exposed to firmware threats and is vulnerable to firmware hacking. This risk goes well beyond the realm of smartphones and laptops. Edge compute solutions, including connected…
what is firmware

What Is Firmware? A Firmware Overview and History

What Is Firmware? It exists on every type of computing device, from kitchen appliances to autonomous vehicles, yet many people don’t understand its function. Let’s start at the beginning to answer the question, “What is firmware?” Basic…

Firmware Security in the Age of Edge Computing

When it comes to cybersecurity, malicious attackers will always discover the weakest point in a target’s defenses and focus their attacks on that area. As each area of cyber defense grows stronger, attackers move on to the next most vulnerable…