Skip to content
Copper Horse

Excellence in AI, Automotive, IoT & Mobile Security

  • Home
  • About
    • Carbon Reduction Plan
  • IoT Security
  • Artificial Intelligence
  • Automotive Security
  • Threat Modelling
  • Resources
    • IoT Vulnerability Disclosure Research
    • Securing IoT by Design
    • Automotive Whitepapers
    • Mobile Security Leaflet
  • Our Sites
  • Contact
  • Careers
  • Copper Horse Racing
January 31, 2023

Who pays? Examining the costs of automotive cybersecurity and related standards 

During its two-year participation in Secure-CAV (a project focusing on advanced cybersecurity for connected and autonomous vehicles) Copper Horse had the opportunity to examine the automotive cybersecurity standards landscape. One of the subsequent outputs based on this work was a living list – published to...

Categories Automotive Security
January 24, 2023

With Legislation Mandating Vulnerability Disclosure for Consumer IoT, the Industry Still Falls Short

We’re pleased to announce that the IoT Security Foundation has released the latest annual report examining the state of vulnerability disclosure in the consumer internet of things (IoT) space. The report was created by Copper Horse with the support of HackerOne. You can find out...

Categories IoT Security
December 9, 2022

Reviewing the App Store Ecosystem

The UK’s Department for Digital, Media, Culture & Sport (DCMS) commissioned Copper Horse to research the current situation in the app store ecosystem, reviewing app stores for various devices. We’re pleased to be able to publish the resulting information as open data for anyone to...

Categories Uncategorized
December 9, 2022

Mapping App Security Standards

Here at Copper Horse we’ve been working on some really interesting projects in conjunction with the UK’s DCMS (Department for Digital, Culture, Media & Sport). We were commissioned to look into the current state of app security standards and recommendations with a view to explore...

Categories Uncategorized
October 26, 2022

Re-branding Copper Horse!

David Rogers explains the new company brand. We’re delighted to have a new look to Copper Horse. I started the company over 10 years ago – the logo was obvious initially, the company was named after the Copper Horse statue in Windsor Great Park, the...

Categories Uncategorized
March 10, 2022

Telecoms Industry Ransomware Victims

Copper Horse’s Rohan Panesar takes a high-level look at publicly available ‘claimed’ ransomware attacks against the Telecoms sector. The number of ransomware groups targeting telecommunication companies has grown in recent years. Details of attacks are often difficult to obtain, but we have compiled this high-level...

Categories Uncategorized
March 3, 2022

History lessons 5: The game of defence and attack

Security is sometimes described as an art form – whether you’re breaking security or making something secure, you have to be creative. It is a continuous game or duel of wits that has played out throughout history from the physical enclaves of castles through to the hardware of connected devices.

Categories History and security
January 12, 2022

Automotive cybersecurity standards – a living list

Last updated, January 2022 This is the home of our automotive cybersecurity standards living list. As mentioned in our Overview of the automotive cybersecurity standards landscape, we have identified a long list of documents either supporting or directly related to automotive cybersecurity, which can be broadly classified into...

Categories Automotive Security
January 12, 2022

An overview of the automotive cybersecurity standards landscape

The advent of numerous wireless connections and telemetry services has extended the attack surface of a modern vehicle far beyond its physical boundary. What’s more, as automakers strive to meet the expectations of a fully autonomous driving experience, future cars will need to rely even more heavily on the data around...

Categories Automotive Security
November 5, 2021

History lessons 4: What to do when an anomaly is detected?

There are many tales from history where things have been detected that have led to plots being uncovered. Some of this has been driven by prior knowledge, sometimes the actors involved are already under suspicion in some way and in other cases it is pure chance and luck.

Categories History and security

Posts pagination

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 8
  • 9
  • »

Copper Horse specialises in tackling future security challenges across many domains and industries from AI, automotive, mobile and IoT. We provide a wide range of services including engineering solutions throughout the product lifecycle from requirements to product security investigations. We offer security training and have a huge range of consulting expertise to help in areas such as mobile telecoms and connected products security. If you have an interesting and complex security problem, we are here to help.

5G ai apex online racing automotive automotive security autonomous vehicles Barcelona code of practice connected car copper horse copperhorseracing cvd cyber security David Rogers DCMS esports ETSI GSMA history Internet of Things IoT IoT security iot security foundation iotsf Mapping mobile mobile security mobile world congress NCSC NIST privacy secure-cav security security research smart cities smart home smart IoT london standards TAIBOM telecoms threat modelling training UK government vulnerability disclosure W3C

Copper Horse is an Associate Member of the GSM Association

Cyber Essentials Certified

Cyber Essentials Certified

©2026 Copper Horse / Privacy Policy

  • Twitter
  • Contact Form
Back To Top
We use cookies to ensure that we give you the best experience on our website.