Threat modelling connected and autonomous vehicle cybersecurity: an overview of available tools

Automotive industry standards recommend threat modelling as a key element in strengthening the cybersecurity of road vehicles. In the second in our series of automotive blog posts, James Tyrrell provides an overview of available tools from simple drawing and flow-charting applications through to more automated threat-generation solutions with built-in libraries and templating options.

Copper Horse and Arm launch white paper on IoT security by design

“If you’re looking to deploy IoT, you need to do it right from the start and you need to think about what happens with that product throughout its lifetime, until you sunset it,” David Rogers MBE – founder of Copper Horse and author of the UK’s Code of Practice for Consumer IoT Security – told listeners at yesterday’s launch webinar (available to watch on-demand). “That means working with suppliers and partners who you can trust will take the right approach to security and platforms.”