Home » Connected Transport » News: Cyber security engineers hone in on ELD vulnerabilities for truckers
Other content in this Stream
White Paper: An insight on cybersecurity complexities and initiatives in the automotive industry
Infographic: Putting security in the driver's seat
Cloakware® for Connected Transport Brochure
Beyond Media Fact Sheet
Keystone – Secure Vehicle Keyless Access & Management
Discover Keystone, a secure system that allows vehicle owners to create and control policies around multi-user vehicle access, settings and usage.
Datasheet: Cloakware Software Protection
Ep. 4 – How does car software get secured?
What actually happens when an attacker modifies the code of the embedded software within your connected car and how do you prevent that.
Ep. 3 – Why an Intrusion Detection System (IDS) is simply not enough.
Stacy explains why a Firewall + IDS combo, even though extremely important, are simply not enough to fully protect your ECU and your car.
Datasheet: Cloakware Secure Environment
Secure Environment forces hackers to expend an improbable amount of effort to break into vehicles, making them move on to softer targets that aren’t as well protected.
Press release: Frost & Sullivan applauds Irdeto's digital security platform, Cloakware for Automotive
Solution overview: Cloakware for Connected Transport
As connected vehicles become the norm, we expect to see more hackers launching targeted cyberattacks, which will impact physical safety, damage your brand and expose you to enormous liabilities.
Digital Security for the Connected Car
By adapting Irdeto’s deep-level security concept with our monitoring services, you will achieve a multi-layered software security platform that is renewable and diversified. In this way, we can ensure
Solution overview: Automotive Threat Assessment Services
The modern auto environment is a soft target for hackers. The auto industry has not been exposed to hacking in the same way as other modern industries with regard to anti-hacking protection.
White paper: The car – a hostile environment requiring protection
Physical access to a device gives root privileges to exploit security vulnerabilities in connected cars. This can be protected by the Irdeto Cloakware for Automotive suite of solutions.
Datasheet: Architecture Review
Architectural Review services evaluates system architecture and software design to create risk assessments that identify weaknesses, providing OEMs and tier ones with corrective mitigations.
Datasheet: Cloakware for Automotive - Software Protection Service
Software Protection Service protects against code tampering, code reverse engineering, data tampering, data siphoning, and supports in-vehicle, iOS and Android mobile applications
Datasheet: Cloakware Keys & Credentials
Helps OEMs with customization of key packages tailored to hardware models, industry best practices for key management, factory and field key provisioning of ECUs, security engineering.
Datasheet: Cloakware for Automotive - Penetration Test
Penetration testing is an important part of cyber risk management. Irdeto’s team identifies security holes in much less time than teams using blackbox testing, taking weeks rather than months.
Infosheet: Cloakware for Automotive - Pre-emptive Vehicle Protection