Blog
Welcome to our Blog, a space dedicated to navigating the intricate realms of embedded security and automotive cybersecurity. Join us as we delve into the inner workings of technology that power our vehicles and interconnected systems. Whether you’re a cybersecurity aficionado, an industry insider, or simply curious about the intersection of technology and automotive safety, our Blog offers a genuine exploration of insights and discussions without the sales pitch
Categories:
Quo vadis Automotive Ethernet?
|
The automotive industry is undergoing profound change. Advances in areas such as autonomous driving, advanced driver assistance systems (ADAS), infotainment and vehicle connectivity require powerful…
ScapyCon Recap: Two days of network manipulation
|
ScapyCon 2024 in Regensburg was a complete success! As the organizer, we can look back on two exciting days full of intensive presentations, practical workshops…
Cybersecurity in agriculture: ISO 24882
|
Digitalization has long since reached the agricultural sector and brings with it considerable risks as well as opportunities. A newly developed standard, ISO 24882, will set…
dissecto x CYEQT – collaboration for the future
|
ScapyCon 24 marks the start of an exciting new phase for dissecto and CYEQT Knowledge Base. The collaboration between two pioneers of automotive security sends…
China’s New Vehicle Cybersecurity Standard: GB 44495-2024
|
China is making strides in vehicle cybersecurity with the release of a new standard, GB 44495-2024, which is set to raise the bar for protecting…
Milestone reached: TISAX certification
|
We are thrilled to announce that we have achieved our first TISAX (Trusted Information Security Assessment Exchange) certification, a significant milestone in our commitment to…
Complying with UNECE R155 and ISO 21434
|
The forthcoming era of mobility excites consumers and brings forth lucrative business opportunities for automobile manufacturers. With escalating connectivity, future mobility solutions such as autonomous…
Cybersecurity 101
|
The word “cybersecurity” is a fusion of two words: “cyber,” derived from the Greek word “kybernetes,” meaning “steersman” or “governor,” and “security,” which we all…
Types of Hackers: the Good, the Bad & the Ugly
|
In the world of the internet, the term “hacker” can mean different things to different people. In this blog post, we’ll take a closer look…
CAN-Card: Business Card turned Interface
|
The worlds first business card that is also a CAN interface! The dissecto CAN-Card based on the candleLight project and is open source and open hardware. The hardware is based…
Escar 23: Key Takeaways
|
Last week, we were an exhibitor at the 21st escar conference in Hamburg. First held in Germany in 2003, escar has since established itself internationally – in…