Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.
ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.
Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.
SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.
ESCRYPT experts discuss the global demands on the ESCRYPT Intrusion Detection and Prevention Solution (IDPS) and its several components based on a review of binding legislation.
EB experts discuss the latest UNECE regulations covering over-the-air software updates and explain how OEMs and suppliers can overcome evolving challenges to implement them successfully.
ESCRYPT’s Dr Michael Peter Schneider examines the security mechanisms included in the latest AUTOSAR releases and explains how they should be integrated into the Software Engineering Process.
Experts from OpenSynergy and LDRA discuss the inherent security of a virtualized architecture, and how that strength can be underpinned by applying secure development techniques to code that handles data passed between processes.
ESCRYPT’s cybersecurity experts discuss the organizational processes that OEMs and suppliers must implement to comply with the latest software update delivery regulations.
Experts from Elektrobit and Argus Cyber Security explain the need for a secure architecture and how to enforce security zones with intrusion detection and prevention systems.
Experts from ESCRYPT explain how and to what extent you can use the existing AUTOSAR security software to realize UNECE-compliant automotive cybersecurity.
ESCRYPT’s Omar Alshabibi explains how to bootstrap a V2X OBU or RSU at the manufacturing plant of an OEM or Tier 1 supplier in the most efficient way.
AVL’s Stefan Marksteiner and David Tromba explain how to structure cybersecurity testing in an automotive environment.
Experts from ESCRYPT, KPMG, and Alyne discuss how to manage cybersecurity supplier governance effectively.
ESCRYPT’s Dr. Eng. Siddharth Shukla provides insight into E/E architecture trends, focusing on the benefits and challenges of Ethernet in automotive E/E architectures.
ESCRYPT’s Dr Efstathia Katsigianni outlines the role of asymmetric cryptography for the security of automotive systems.
Experts from Elektrobit and Argus Cyber Security provide insight into the technology challenges posed by the new requirements and discuss innovative ways in which OEMs and their suppliers can address them.
EB’s Dr Sebastian Ohl outlines a new approach to the development and integration of next-generation automotive architectures based on HPC.
ESCRYPT’s Dr. Martin Moser provides insight into different IT security testing methods, the benefits of whitebox testing, and discusses the system components that should be tested.
In this webinar, Jill Britton and Steve Howard of Perforce discuss what it means to comply with a coding standard, and how to achieve compliance quickly and efficiently.