The Latest in IT Security

Top 5 Threat Vectors in Connected Cars and How to Combat Them

02
Oct
2020
Top 5 Threat Vectors in Connected Cars and How to Combat Them

image credit: pxhere

Plug-in electric and at least partially autonomous connected cars are a common sight on roads around the world.

The software and electronic component market for those vehicles is projected to grow from $238 billion to $469 billion between 2020 and 2030. Both cybersecurity and ‘privacy by design and default’ have been holistically embedded into operations across many manufacturers, supply chains and delivery infrastructures. But, these are vulnerable to cyberattacks, as are the vehicles themselves once they leave the assembly line. They need cyber resilience standards as much as any other computer.

Read More

Comments are closed.

Categories

TUESDAY, OCTOBER 20, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments