Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles
BlogOver the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex software required to run these vehicles all sits on top of firmware, which has been facing an…
Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation
BlogThis is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps, and finally, this part explains why you need…
The Top 5 Autonomous Vehicle Security Gaps
BlogThis is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 reviews attack vectors, and this article addresses security gaps. Finally, part 4 explains why you need development…
Autonomous Vehicle Hacking: Exploring Potential Attack Vectors
BlogThis is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. This part and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…
Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack
BlogThis is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…
Firmware Protection: How to Solve for Firmware Security Gaps
BlogDevice and chip makers have an obligation to improve their firmware protection to defend against threats. If nothing else, they need to defend themselves. Selling products that are later revealed to have vulnerabilities is expensive and bad…
Firmware Hacking: Exploring Potential Security Gaps and Vulnerabilities
BlogFirmware is in every computing device. Therefore, every device is exposed to firmware threats and is vulnerable to firmware hacking. This risk goes well beyond the realm of smartphones and laptops. Edge compute solutions, including connected…
What Is Firmware? A Firmware Overview and History
BlogWhat Is Firmware?
It exists on every type of computing device, from kitchen appliances to autonomous vehicles, yet many people don’t understand its function. Let’s start at the beginning to answer the question, “What is firmware?”
Basic…
Firmware Security in the Age of Edge Computing
BlogWhen it comes to cybersecurity, malicious attackers will always discover the weakest point in a target’s defenses and focus their attacks on that area. As each area of cyber defense grows stronger, attackers move on to the next most vulnerable…