Ep. 4 – How does car software get secured?

January 24, 2018
What actually happens when an attacker modifies the code of the embedded software within your connected car and how do you prevent that.
Previous Flipbook
Datasheet: Cloakware Software Protection
Datasheet: Cloakware Software Protection

Next Video
Ep. 3 – Why an Intrusion Detection System (IDS) is simply not enough.
Ep. 3 – Why an Intrusion Detection System (IDS) is simply not enough.

Stacy explains why a Firewall + IDS combo, even though extremely important, are simply not enough to fully ...