• Products
    • EVSec
    • EVSEC Analysis
    • EVSEC Attacker
    • EVSEC Endpoint
    • EVSEC Network
    • EVSEC VSOC Analyzer
  • News & Media
    • Media Articles
    • Press Releases
    • Blog
    • Events
    • Webinars
  • Research
  • About Us
  • Contact
  • English
    • 简体中文
Menu
  • Products
    • EVSec
    • EVSEC Analysis
    • EVSEC Attacker
    • EVSEC Endpoint
    • EVSEC Network
    • EVSEC VSOC Analyzer
  • News & Media
    • Media Articles
    • Press Releases
    • Blog
    • Events
    • Webinars
  • Research
  • About Us
  • Contact
  • English
    • 简体中文

Must Follow

C2A's Blog Posts

C2A Deep Dive: threats facing the EV ecosystem

September 19, 2022

Curious about the threats facing electric vehicles, charging stations and the grid? We’ve got you covered. C2A has rounded up the latest coverage of threats against the EV ecosystem, diving into the implications of each.

Read More
  • All
  • Connected Vehicles
  • Cybersecurity Regulation
  • Research & Trends
  • Risk Assessment
  • Security Lifecycle Management
  • All
  • Connected Vehicles
  • Cybersecurity Regulation
  • Research & Trends
  • Risk Assessment
  • Security Lifecycle Management

C2A Deep Dive: threats facing the EV ecosystem

September 19, 2022

Curious about the threats facing electric vehicles, charging stations and the grid? We’ve got you covered. C2A has rounded up the latest coverage of threats against the EV ecosystem, diving into the implications of each.

Read More

A glitch in the (EV) matrix

July 4, 2022

The development of the first electric vehicle in 1832 has since given way to an ecosystem nobody at the time could anticipate. Though consumer demand is set to soar in the coming years, with 30 million EVs expected to take to roads in the EU alone, challenges have surfaced at every point in the supply chain. A lack of raw materials is causing battery shortage, manufacturing constraints result in slow delivery to consumers, while the U.S. may need to increase the supply of EV charging by as much as 20 times to effectively meet demand.

Read More

The Ultimate Guide Part 2: Automotive Cybersecurity Best Practice Recommendations

June 20, 2022

With new standards and regulations at play, security teams are abandoning outdated practices and implementing a more methodical, systematic approach to cybersecurity across all organizations. Following our review of ISO 21434 and WP.29 R155 Regulation, C2A Security reviews industry best practice, and how these can be seamlessly adopted across the automotive supply chain.

Read More

C2A Research Report: Visibility and traceability are critical to automotive cybersecurity at large. AutoSec can help

May 1, 2022

A report by C2A Security assessed the state of the automotive industry in its journey to ISO 21434 implementation, and the current approach to cybersecurity lifecycle management. As the industry shifts, huge gaps in security posture and protocol form — but so does huge opportunity.

Read More

The Ultimate Guide: Automotive Cybersecurity Standards & Regulations

April 25, 2022

Automotive Cybersecurity professionals have had to cope with a seismic shift to increasingly complex vehicle architecture, all while balancing compliance with new ISO 21434 standards and WP.29 R155 regulation. C2A Security dives into each area to provide security professionals with the ultimate guide to standards and regulations.

Read More

Attack trees aren’t one-size-fits-all: designing adaptable attack tree models for reuse

February 24, 2022

Building attack trees for scale is a difficult task – C2A Security Director of Product, David Mor Ofek provides a blueprint for security assessors that allow attack trees to grow with your model.

Read More

Driving toward Compliance: Auto Industry Scaling up to Meet New Regulations for In-Vehicle Cybersecurity

November 24, 2021

By requiring makers and suppliers to ensure cybersecurity compliance in all new vehicles, WP.29 and ISO/SAE 21434 drive scaling security capabilities across the supply chain.

Read More

From Cacophony to Symphony — time to be on the same note

October 4, 2021

An orchestra without a conductor can only get so far — same goes for automotive cybersecurity. Orchestrating cybersecurity management is the next step toward comprehensive cyber-protection for the entire vehicle lifecycle.

Read More

Automotive cybersecurity risk assessment — How can we do better?

May 10, 2021

Risk assessments are an example of a core activity we should always strive to improve and perform faster and more effectively. How long does the typical risk assessment process take?

Read More
Load More
No more posts to show

FOLLOW US

  • youtube hover YouTube
  • linkedin hover LinkedIn
  • WeChat
Join our newsletter

ADDRESS

Technology Park
Derech Agudat Sport Ha’poel 2
Jerusalem 9695102, ISRAEL

SEND US A MESSAGE

And we will get back to you soon
  • © 2023 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Twitter youtube icon Linkedin
  • Products
    • EVSec
    • EVSEC Analysis
    • EVSEC Attacker
    • EVSEC Endpoint
    • EVSEC Network
    • EVSEC VSOC Analyzer
  • News & Media
    • Media Articles
    • Press Releases
    • Blog
    • Events
    • Webinars
  • Research
  • About Us
  • Contact
  • English
    • 简体中文
  • Products
    • EVSec
    • EVSEC Analysis
    • EVSEC Attacker
    • EVSEC Endpoint
    • EVSEC Network
    • EVSEC VSOC Analyzer
  • News & Media
    • Media Articles
    • Press Releases
    • Blog
    • Events
    • Webinars
  • Research
  • About Us
  • Contact
  • English
    • 简体中文
Learn More