- Read MoreThreat ReportsDecember 5, 2023In our comprehensive report, we take stock of the various trends and incidents that have arisen this year to paint a broad picture of the dynamic automotive cyberthreat landscape.
- Read MoreThreat ReportsNovember 15, 2023From the hidden world of automotive data to the current and emergent trends in the cyberthreat landscape, we examine the road the industry is on to chart a secure course ahead.
- Read MoreThreat ReportsNovember 29, 2022From ransomware attacks to supply-chain risks, attacks and threats in 2022 indicate a swiftly evolving threat landscape for the connected car. We reexamine the prominent incidents and trends this year to glean just how the industry can gear up for the years ahead.
Reports
Research Papers
- Read MoreResearch PapersMarch 12, 2024Implementing zero trust cybersecurity in the automotive industry brings numerous benefits that significantly enhance the overall security posture and resilience of the ecosystem. By adopting zero trust principles, automotive industry stakeholders can establish a robust security foundation that mitigates cyber risks and ensures the protection of critical assets.
- Read MoreResearch PapersNovember 15, 2023As data rises as a major consideration for automotive cybersecurity, we address knowledge gaps on the expanding world of vehicle data and highlight security trends that have emerged this year.
- Read MoreResearch PapersJuly 29, 2022For this research paper, we calculated the severity levels of the attack vectors listed in UN Regulation No. 155, using the industry standard DREAD threat model.
- Read MoreResearch PapersJuly 28, 2022The expectations of the functions and usage of today’s automobiles are changing as connectivity drives the demand for more modern features. In response, the automotive industry is quickly churning out more connected cars, adjusting their development and production cycles to accommodate the market.
- Read MoreResearch PapersJuly 27, 2022The use of connected cars continues to grow. While the vehicles’ link to technologies such as 5G and the cloud present opportunities for improving efficiency and safety, it can also attract risks from threat actors as well.
- Read MoreResearch PapersJuly 26, 2022As connected cars continue to evolve, so does the need to secure them from an expanding threat landscape. To effectively protect connected cars, the comprehensive ecosystem of the vehicle must be considered.
Use Cases
Partner Stories
- Read MorePartner StoriesMarch 11, 2024Primax’s use of source code scanning tools during the software development phase posed a dilemma: Should it prioritize product schedule or security compliance? To help tackle its challenges, Primax ultimately chose VicOne’s xZETA automotive vulnerability and SBOM management system.
- Read MorePartner StoriesMarch 11, 2024Primax’s use of source code scanning tools during the software development phase posed a dilemma: Should it prioritize product schedule or security compliance? To help tackle its challenges, Primax ultimately chose VicOne’s xZETA automotive vulnerability and SBOM management system.
- Read MorePartner StoriesFebruary 25, 2024Askey, a global provider of network communications and electronics manufacturing, has implemented the VicOne xZETA vulnerability scanning and SBOM management tool in the development process of its connected vehicle devices that combine on-board unit (OBU), roadside unit (RSU), and cloud-based advanced technologies for smart transportation.
- Read MorePartner StoriesDecember 21, 2023In line with the global push for net-zero emissions, countries are actively working to reduce vehicular particulate emissions. Both traditional automotive manufacturers (OEMs) and emerging electric vehicle (EV) makers, are accelerating their transition to support net-zero goals.
- Read MorePartner StoriesSeptember 19, 2023Askey, a global provider of network communications and electronics manufacturing, has implemented the VicOne xZETA vulnerability scanning and SBOM management tool in the development process of its connected vehicle devices that combine on-board unit (OBU), roadside unit (RSU), and cloud-based advanced technologies for smart transportation.
Solution Briefs
- Read MoreSolution BriefsJune 27, 2024The cyberattack surface has expanded rapidly with the trend toward software-defined vehicles (SDVs) and increasing reliance on the cloud and APIs. It has been challenging to attain security visibility across the broadening automotive ecosystem, but VicOne and 42Crunch’s integrated solution promises to eliminate unknown security blind spots.
- Read MoreSolution BriefsJune 11, 2024The automotive industry faces many challenges, from complying with new regulations to dealing with vulnerabilities and preparing for threats on the horizon. How can the automotive supply chain equip itself to handle these challenges?
- Read MoreSolution BriefsMay 31, 2024Calculating risk scores to identify relevant risks is no easy task because of cognitive bias, information silos, and non-actionable insights. Integrated adaptive vehicle risk management addresses these issues to prioritize risks accurately, accelerate time for risk assessment, and enable early protection.
- Read MoreSolution BriefsApril 10, 2024Our solutions provide multilayered cybersecurity protection to keep your electric vehicle supply equipment (EVSE) or charging systems up and running. Because certain network attacks cannot be mitigated through Secure by Design alone, VicOne’s EV Charging System Protection solutions go beyond the scope of Secure by Design by proactively identifying vulnerabilities while safeguarding charging stations from potential attacks via our security agent.
- Read MoreSolution BriefsFebruary 16, 2024The common approach involves using cloud-based vehicle security operations center (VSOC) platforms for their quick installation and noninvasiveness. But as the attack surface has expanded from the cloud to in-vehicle components and infrastructure, relying solely on today’s VSOC platforms might not bring about sufficient protection.
- Read MoreSolution BriefsJanuary 8, 2024Software-enabled services represent your next opportunity for generating revenue, so protecting your customers' personally identifiable information (PII) and data privacy is crucial to earning their trust. Don't let the vehicle become the weakest link in safeguarding your customers' personal data, privacy, IVI systems, and outside connections.
Analyst Reports
- Read MoreAnalyst ReportsOctober 25, 2023Identified as best in class in the Japan automotive cybersecurity industry.
- Read MoreAnalyst ReportsMarch 28, 2023Omdia Research Report Cites VicOne’s Solutions Portfolio as Proactive Approach to Boosting VSOC Capabilities
Our News and Views
Gain Insights Into Automotive Cybersecurity
- Read MoreBlogJuly 4, 2024A software provider for automotive dealerships recently fell victim to a ransomware attack, causing widespread outages and crippling operations for thousands of car dealers. We examine the far-reaching implications of this incident on the automotive supply chain, outline critical lessons learned, and provide strategic security recommendations for automotive stakeholders.
- Read MoreBlogJune 19, 2024In this second part of our series on vehicle entry system technology, we focus on its most recent iteration, the ultra-wideband (UWB) protocol. We cover its advantages, the potential vulnerabilities it carries, and the measures that will help secure its integration into vehicles.
- Read MoreBlogJune 11, 2024VicOne has partnered with the Automotive Security Research Group (ASRG) to launch AutoVulnDB, an innovative database focused on automotive vulnerabilities. This initiative provides exceptional coverage of automotive threat intelligence, establishing VicOne as the industry leader in comprehensive vulnerability management.