Tag Archive for: av
Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles
BlogOver the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex software required to run these vehicles all sits on top of firmware, which has been facing an…
Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation
BlogThis is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps, and finally, this part explains why you need…
The Top 5 Autonomous Vehicle Security Gaps
BlogThis is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 reviews attack vectors, and this article addresses security gaps. Finally, part 4 explains why you need development…
Autonomous Vehicle Hacking: Exploring Potential Attack Vectors
BlogThis is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. This part and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…
Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack
BlogThis is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…