sb-as logo
Story image

Keysight solution helps prevent cyber-attacks on connected vehicles

12 Aug 2019

Keysight Technologies has delivered a security portfolio to address the growing concern of cyber-attacks on connected vehicles.

The cyber-world is growing more embedded in everyone’s lives, not only enabling entertainment and comfort but increasingly impacting the safe operation of automobiles. 

While this technology has unique benefits, it also opens risks of exposure, including malicious hacker activities.

The new reality is that cyber-attacks against automobiles could result in the loss of human life.

A recent report from a consumer watchdog has exposed the reality about the cybersecurity risk in connected vehicles.

Keysight Technologies understands these risks and offers solutions to test and measure connected vehicle technologies, including the newly announced Automotive Cybersecurity Program that validates the resiliency of connected components of a vehicle, individually or as an entirely functioning automobile prior and post-deployment.

In addition, security solutions developed by Ixia Solutions Group (ISG), enables Keysight to deliver extensive security validations of the 4G/5G radio access network (RAN) infrastructure that connects vehicles, and the backend data centres that manage business operations.

ISG’s visibility solutions deliver an enhanced infrastructure that improves the efficiency of security toolsets in production networks.

Keysight provides test and measurement of cybersecurity effectiveness from the ECU level up to the cloud data centre.

“Early assessment, prior to production, is essential to enabling our automotive customers to deliver safe and supportable vehicles,” says Ixia Solutions Group president Mark Pierpoint. 

“Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing, notwithstanding the possible loss of human life. “Continued detection and mitigation of cybersecurity threats once vehicles are on the road are equally critical to keep consumers safe,” he adds. 

“Cybersecurity testing is an essential defence to ensure the design and implementation of a bulletproof security posture in connected vehicles.”

“Cars today support multiple communication methods, like Bluetooth and USB while a growing number of cars use mobile communication for a variety of services available in the car,” says Keysight automotive and energy solutions business general manager Tom Goetzl.

“Keysight’s Automotive Cybersecurity program can test for vulnerabilities on all available communication ports and provides direction to our customers on how to close such vulnerabilities.”

Keysight offers a portfolio of solutions to help prevent vehicles from being cyber-hijacked, including:

  • Automotive Cybersecurity Program – to validate and exploit the potential attack surfaces existing in connected vehicles
     
  • Automotive Gateway Security Test – to validate the zoning and security posture of in-vehicle networks
     
  • Network Security Test – to validate and stress a network infrastructure and backend data centers
     
  • Application & Threat Intelligence (ATI) Research Center – to ensure testing that includes the latest application and security strike simulation
     
  • Visibility for Network Security – to improve the performance of a security architecture with 100% visibility of all traffic on an automotive network
Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Mobile devices biggest enterprise security threat - report
Businesses have left themselves vulnerable and open to cyber criminals in the rush to ensure their workforce could operate remotely during the Covid-19 pandemic.More