sb-as logo
Story image

Keysight solution helps prevent cyber-attacks on connected vehicles

12 Aug 2019

Keysight Technologies has delivered a security portfolio to address the growing concern of cyber-attacks on connected vehicles.

The cyber-world is growing more embedded in everyone’s lives, not only enabling entertainment and comfort but increasingly impacting the safe operation of automobiles. 

While this technology has unique benefits, it also opens risks of exposure, including malicious hacker activities.

The new reality is that cyber-attacks against automobiles could result in the loss of human life.

A recent report from a consumer watchdog has exposed the reality about the cybersecurity risk in connected vehicles.

Keysight Technologies understands these risks and offers solutions to test and measure connected vehicle technologies, including the newly announced Automotive Cybersecurity Program that validates the resiliency of connected components of a vehicle, individually or as an entirely functioning automobile prior and post-deployment.

In addition, security solutions developed by Ixia Solutions Group (ISG), enables Keysight to deliver extensive security validations of the 4G/5G radio access network (RAN) infrastructure that connects vehicles, and the backend data centres that manage business operations.

ISG’s visibility solutions deliver an enhanced infrastructure that improves the efficiency of security toolsets in production networks.

Keysight provides test and measurement of cybersecurity effectiveness from the ECU level up to the cloud data centre.

“Early assessment, prior to production, is essential to enabling our automotive customers to deliver safe and supportable vehicles,” says Ixia Solutions Group president Mark Pierpoint. 

“Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing, notwithstanding the possible loss of human life. “Continued detection and mitigation of cybersecurity threats once vehicles are on the road are equally critical to keep consumers safe,” he adds. 

“Cybersecurity testing is an essential defence to ensure the design and implementation of a bulletproof security posture in connected vehicles.”

“Cars today support multiple communication methods, like Bluetooth and USB while a growing number of cars use mobile communication for a variety of services available in the car,” says Keysight automotive and energy solutions business general manager Tom Goetzl.

“Keysight’s Automotive Cybersecurity program can test for vulnerabilities on all available communication ports and provides direction to our customers on how to close such vulnerabilities.”

Keysight offers a portfolio of solutions to help prevent vehicles from being cyber-hijacked, including:

  • Automotive Cybersecurity Program – to validate and exploit the potential attack surfaces existing in connected vehicles
     
  • Automotive Gateway Security Test – to validate the zoning and security posture of in-vehicle networks
     
  • Network Security Test – to validate and stress a network infrastructure and backend data centers
     
  • Application & Threat Intelligence (ATI) Research Center – to ensure testing that includes the latest application and security strike simulation
     
  • Visibility for Network Security – to improve the performance of a security architecture with 100% visibility of all traffic on an automotive network
Story image
CIOs put too much trust in TLS certificates - survey
Despite the prolific usage of TLS certificates within organisations, many CIOs aren't concerned about security risks associated with TLS machine identities.More
Story image
Cyber threat intelligence reaching maturity in organisations worldwide
Cyber threat intelligence is reaching a state of maturity and integration in organisations across the globe, according to a survey by the SANS Institute and ThreatQuotient.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
Bitglass deepens integration with MFA vendor Duo Security
Bitglass has announced a deepened integration with Duo Security, now part of Cisco, as it looks to strengthen security for the modern workforce.More
Download image
NFV touted as go-to method of simplifying corporate networks
Enterprises outline their considerations in this study, built on evidence from those directly involved with building a strong networking infrastructure.More