- Read MoreThreat ReportsDecember 5, 2023In our comprehensive report, we take stock of the various trends and incidents that have arisen this year to paint a broad picture of the dynamic automotive cyberthreat landscape.
- Read MoreThreat ReportsNovember 15, 2023From the hidden world of automotive data to the current and emergent trends in the cyberthreat landscape, we examine the road the industry is on to chart a secure course ahead.
- Read MoreThreat ReportsNovember 29, 2022From ransomware attacks to supply-chain risks, attacks and threats in 2022 indicate a swiftly evolving threat landscape for the connected car. We reexamine the prominent incidents and trends this year to glean just how the industry can gear up for the years ahead.
Reports
Research Papers
- Read MoreResearch PapersMarch 12, 2024Implementing zero trust cybersecurity in the automotive industry brings numerous benefits that significantly enhance the overall security posture and resilience of the ecosystem. By adopting zero trust principles, automotive industry stakeholders can establish a robust security foundation that mitigates cyber risks and ensures the protection of critical assets.
- Read MoreResearch PapersNovember 15, 2023As data rises as a major consideration for automotive cybersecurity, we address knowledge gaps on the expanding world of vehicle data and highlight security trends that have emerged this year.
- Read MoreResearch PapersJuly 29, 2022For this research paper, we calculated the severity levels of the attack vectors listed in UN Regulation No. 155, using the industry standard DREAD threat model.
- Read MoreResearch PapersJuly 28, 2022The expectations of the functions and usage of today’s automobiles are changing as connectivity drives the demand for more modern features. In response, the automotive industry is quickly churning out more connected cars, adjusting their development and production cycles to accommodate the market.
- Read MoreResearch PapersJuly 27, 2022The use of connected cars continues to grow. While the vehicles’ link to technologies such as 5G and the cloud present opportunities for improving efficiency and safety, it can also attract risks from threat actors as well.
- Read MoreResearch PapersJuly 26, 2022As connected cars continue to evolve, so does the need to secure them from an expanding threat landscape. To effectively protect connected cars, the comprehensive ecosystem of the vehicle must be considered.
Use Cases
Partner Stories
- Read MorePartner StoriesSeptember 10, 2024UD Trucks has partnered with VicOne to enhance cybersecurity in its software-defined vehicles (SDVs) and ensure compliance with UN Regulation No. 155 (UN R155), addressing the growing risks in smart logistics.
- Read MorePartner StoriesMarch 11, 2024Primax’s use of source code scanning tools during the software development phase posed a dilemma: Should it prioritize product schedule or security compliance? To help tackle its challenges, Primax ultimately chose VicOne’s xZETA automotive vulnerability and SBOM management system.
- Read MorePartner StoriesMarch 11, 2024Primax’s use of source code scanning tools during the software development phase posed a dilemma: Should it prioritize product schedule or security compliance? To help tackle its challenges, Primax ultimately chose VicOne’s xZETA automotive vulnerability and SBOM management system.
- Read MorePartner StoriesFebruary 25, 2024Askey, a global provider of network communications and electronics manufacturing, has implemented the VicOne xZETA vulnerability scanning and SBOM management tool in the development process of its connected vehicle devices that combine on-board unit (OBU), roadside unit (RSU), and cloud-based advanced technologies for smart transportation.
- Read MorePartner StoriesDecember 21, 2023In line with the global push for net-zero emissions, countries are actively working to reduce vehicular particulate emissions. Both traditional automotive manufacturers (OEMs) and emerging electric vehicle (EV) makers, are accelerating their transition to support net-zero goals.
- Read MorePartner StoriesSeptember 19, 2023Askey, a global provider of network communications and electronics manufacturing, has implemented the VicOne xZETA vulnerability scanning and SBOM management tool in the development process of its connected vehicle devices that combine on-board unit (OBU), roadside unit (RSU), and cloud-based advanced technologies for smart transportation.
Solution Briefs
- Read MoreSolution BriefsOctober 15, 2024The expanding EV charging ecosystem faces rising cyber risks and complex regulatory challenges. VicOne and Deloitte address these issues with a risk-based security service that provides continuous vulnerability detection, compliance guidance, and proactive protection.
- Read MoreSolution BriefsAugust 21, 2024Rising cybersecurity threats and the high costs of managing connected systems are major concerns in the automotive industry. VicOne’s xCarbon tackles these challenges by offering an efficient, flexible solution that enhances security while minimizing operational overhead. By intelligently detecting and responding to potential threats, xCarbon ensures that vehicles remain secure without compromising on performance or cost-effectiveness.
- Read MoreSolution BriefsJune 27, 2024The cyberattack surface has expanded rapidly with the trend toward software-defined vehicles (SDVs) and increasing reliance on the cloud and APIs. It has been challenging to attain security visibility across the broadening automotive ecosystem, but VicOne and 42Crunch’s integrated solution promises to eliminate unknown security blind spots.
- Read MoreSolution BriefsJune 11, 2024The automotive industry faces many challenges, from complying with new regulations to dealing with vulnerabilities and preparing for threats on the horizon. How can the automotive supply chain equip itself to handle these challenges?
- Read MoreSolution BriefsMay 31, 2024Calculating risk scores to identify relevant risks is no easy task because of cognitive bias, information silos, and non-actionable insights. Integrated adaptive vehicle risk management addresses these issues to prioritize risks accurately, accelerate time for risk assessment, and enable early protection.
- Read MoreSolution BriefsApril 10, 2024Our solutions provide multilayered cybersecurity protection to keep your electric vehicle supply equipment (EVSE) or charging systems up and running. Because certain network attacks cannot be mitigated through Secure by Design alone, VicOne’s EV Charging System Protection solutions go beyond the scope of Secure by Design by proactively identifying vulnerabilities while safeguarding charging stations from potential attacks via our security agent.
White Papers
- Read MoreWhite PapersJuly 30, 2024To effectively mitigate API security risks in the expansive automotive ecosystem, it is essential to implement a systematic approach. Since every component represents a potential attack surface, comprehensive strategies are necessary.
Analyst Reports
- Read MoreAnalyst ReportsOctober 25, 2023Identified as best in class in the Japan automotive cybersecurity industry.
- Read MoreAnalyst ReportsMarch 28, 2023Omdia Research Report Cites VicOne’s Solutions Portfolio as Proactive Approach to Boosting VSOC Capabilities
Our News and Views
Gain Insights Into Automotive Cybersecurity
- Read MoreBlogNovember 25, 2024Qualcomm has taken a significant step toward bringing GenAI to vehicles by integrating its next-generation Oryon processor into in-car systems. We explore the technology powering GenAI, highlighting what makes it so transformative — and the security challenges it introduces.
- Read MoreBlogNovember 13, 2024Exposed serial interfaces in electric vehicle (EV) chargers present a significant vulnerability, enabling attackers to tamper with hardware and firmware. This creates opportunities for malicious activities, highlighting the need for strong security measures to prevent such exploits.