Within the realm of cybersecurity, there is a widespread misconception that it solely involves establishing a digital fortress with strong firewalls and encryption. This stereotype simplifies cybersecurity into a binary concept where systems are viewed as either secure or not secure. However, in automotive development, cybersecurity should be seen as a continuous function instead of a discrete value. The goal... read more →
→ Read full article
Selecting the right Vehicle Security Operations Center provider is a critical decision for any automotive company aiming to enhance cybersecurity measures. A well-chosen VSOC not only protects against the increasingly sophisticated landscape of cyber-threats but also integrates seamlessly with your company’s existing processes and systems. This guide will walk you through the essential factors to consider when choosing a VSOC... read more →
→ Read full article
→ Read full article
In the evolving landscape of the automotive industry, where digital advancements and connectivity are at the forefront, security remains a paramount concern. Traditional cybersecurity engineering practices lay the groundwork for a strong security posture. A VSOC builds upon this foundation by providing real-time threat monitoring, advanced analytics, and faster incident response, taking your automotive security to the next level. Here... read more →
→ Read full article
→ Read full article
In the age of interconnected technology and smart devices, cybersecurity is no longer just a concern for IT departments—it is a fundamental aspect of manufacturing and operational strategy, especially in the automotive industry. This brings us to the concept of a Vehicle Security Operations Center (VSOC), a specialized framework designed to address the unique cybersecurity challenges faced by automotive manufacturers.... read more →
→ Read full article
→ Read full article
In general, you would probably look into questioning faces if someone told you that it can take days, weeks and months to implement cybersecurity in a bicycle. But that's exactly what this client success story is all about. Read on to learn how Brose E-Bike and CYRES Consulting are redefining cybersecurity for e-bikes. Learn about the challenges, solutions and lessons... read more →
→ Read full article
→ Read full article
In line with the requirements of UN Regulation No. 155, the implementation and application of a Cybersecurity Management System (CSMS for short) forms the basis for cybersecurity in the vehicle - for the entire lifecycle. At least every three years, the Original Equipment Manufacturer (OEM) must have its established CSMS audited and provide evidence of fulfilment of the requirements with... read more →
→ Read full article
→ Read full article
UN Regulation No. 155, which continues to be regarded as a milestone for cybersecurity in the automotive industry, is now expanding its scope. In particular, manufacturers and suppliers who are not directly involved in the traditional production of ordinary cars are still confronted with the question of the extent to which UN R155 and the requirements for the CSMS affects... read more →
→ Read full article
→ Read full article
After our ISO/SAE DIS 21434 Pocket Guide (exclusively with contents of the then current version of the standard) and The Essential Guide to ISO/SAE 21434 (the comprehensive reference book on automotive cybersecurity), the first practical handbook with tools for the application of the standard is now available. Since October 2023, the big ISO/SAE 21434:2021 Workbook from CYRES Consulting can be... read more →
→ Read full article
→ Read full article
In 2019 a research team from Google’s quantum computing lab published a paper entitled “Quantum supremacy using a programmable superconducting processor” (Arute et al., 2019). The ripples this sent through the scientific community, however, were not limited to the domain of Physics, but rather were felt across numerous fields, including, notably, cryptography. This is because the arrival of industry-capable quantum... read more →
→ Read full article
→ Read full article
Cybersecurity risks and the resulting goals and requirements alone have a significant impact on development. But when cybersecurity is considered and introduced after the development has already progressed and decisions on system, hardware, or software have already been made, the impact and difficulties increase even more. Throughout this article we want to talk about the hurdles arising from introducing cybersecurity... read more →
→ Read full article
→ Read full article