Blog
Welcome to our Blog, a hub for exploring the evolving world of cybersecurity testing, embedded system security, and automotive cybersecurity. Dive into expert insights on penetration testing tools, securing automotive networks, and the challenges of protecting interconnected systems. Discover how automated security testing with dissecto HydraVision and innovative hardware solutions like the HydraLink Automotive Ethernet Interface and. HydraProbe ECU Security Test Tool are transforming industries. Whether you’re an industry insider, a cybersecurity aficionado or just curious about the intersection of technology and safety, our Blog provides in-depth articles, expert discussions, and practical advice to stay ahead of emerging threats.
Categories:
Cybersecurity in agriculture: ISO 24882
|
Digitalization has long since reached the agricultural sector and brings with it considerable risks as well as opportunities. A newly developed standard, ISO 24882, will set…
dissecto x CYEQT – collaboration for the future
|
ScapyCon 24 marks the start of an exciting new phase for dissecto and CYEQT Knowledge Base. The collaboration between two pioneers of automotive security sends…
China’s New Vehicle Cybersecurity Standard: GB 44495-2024
|
China is making strides in vehicle cybersecurity with the release of a new standard, GB 44495-2024, which is set to raise the bar for protecting…
Milestone reached: TISAX certification
|
We are thrilled to announce that we have achieved our first TISAX (Trusted Information Security Assessment Exchange) certification, a significant milestone in our commitment to…
Complying with UNECE R155 and ISO 21434
|
The forthcoming era of mobility excites consumers and brings forth lucrative business opportunities for automobile manufacturers. With escalating connectivity, future mobility solutions such as autonomous…
Cybersecurity 101
|
The word “cybersecurity” is a fusion of two words: “cyber,” derived from the Greek word “kybernetes,” meaning “steersman” or “governor,” and “security,” which we all…
Types of Hackers: the Good, the Bad & the Ugly
|
In the world of the internet, the term “hacker” can mean different things to different people. In this blog post, we’ll take a closer look…
CAN-Card: Business Card turned Interface
|
The worlds first business card that is also a CAN interface! The dissecto CAN-Card based on the candleLight project and is open source and open hardware. The hardware is based…
Escar 23: Key Takeaways
|
Last week, we were an exhibitor at the 21st escar conference in Hamburg. First held in Germany in 2003, escar has since established itself internationally – in…