20220920 – Cybersecurity in Automobiles

CARS ARE COMPUTERS… electric vehicles and connectivity are profoundly transforming the auto industry, creating new operating models, and bringing cybersecurity challenges. The automotive cybersecurity in 2022 is where software security was 20 years ago, lacking all the standards in place to mitigate risks. Like in the transformation of the computing industry from standalone devices to a connected ecosystem, data sharing will improve safety and allow EVs to smartly use or sell energy to the grid. Ensuring interoperability, verifying cybersecurity, prioritizing safety will soon become part of a world where we all be doing regular software updates to our CARPUTERS  – Carlos Correa
This article brings to attention the need for cybersecurity for automobiles. Unlike Tesla most other auto companies need to retrofit software security after the fact and as correctly pointed out by the author, the need is now.
In drawing parallels to what happened to security in digital transformations and in industrial automation, the author emphatically states that companies need to transform from an engineering/manufacturing mindset to also include software as a key ingredient to their make-up. Remote compromises via hacking could be dangerous and potentially life threatening. There is also a need to deploy over the air updates quickly and efficiently.

Autonomous driving is another prime destination for hacking and auto companies need to be mindful of security threats that would lead to disastrous consequences. “Addressing security across the entire ecosystem of connected cars means verifying the cyber hygiene of suppliers as well…..” states the author. This is where emerging technologies like Blockchain could be leveraged to ascertain the fungibility of data and its immutable characteristics.

We at Numorpho Cybernetic Systems (NUMO) plan to leverage emerging technologies to its fullest to ascertain all aspects of the value chain so that concerns of cybersecurity inside (within the production process) and outside when the product is actively being used by the customer/consumer are proactively addressed.

NI+IN UCHIL Founder, CEO & Technical



Leave a Reply

%d bloggers like this: