article thumbnail

Legendary hackers Charlie Miller and Chris Valasek talk cybersecurity and autonomous vehicles at TC Sessions: Mobility 2022

TechCrunch

Security researchers Charlie Miller and Chris Valasek shook the automotive industry in 2015 by remotely hacking a Jeep Cherokee driven by Wired reporter , and willing participant, Andy Greenberg. Perhaps it’s not surprising then that automotive cyberattacks have grown in frequency — up more than 225% in 2021 , compared to 2018.

Mobile 222
article thumbnail

Industrial cybersecurity startup Claroty raises $140M in pre-IPO funding round

TechCrunch

Claroty, an industrial cybersecurity company that helps customers protect and manage their Internet of Things (IoT) and operational technology (OT) assets, has raised $140 million in its latest, and potentially last round of funding. . Founded in 2015, the late-stage startup focuses on the industrial side of cybersecurity.

Industry 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Daily Crunch: Sources say Times Internet plans to sell Indian streaming platform MX Player to Amazon 

TechCrunch

Christine and Haje The TechCrunch Top 3 Game on : Amazon is in talks to acquire Indian video streaming giant MX Player from Times Internet, Manish reports. How to manage third-party cybersecurity risks that are too costly to ignore Three more from the TC+ team: Batten the hatches : Can your startup survive the economic downturn?

Internet 237
article thumbnail

Applications and innovations in the Internet of Things (IoT)

Hacker Earth Developers Blog

The Internet of Things (IoT) is a system of interrelated devices that have unique identifiers and can autonomously transfer data over a network. IoT ecosystems consist of internet-enabled smart devices that have integrated sensors, processors, and communication hardware to capture, analyze, and send data from their immediate environments.

IoT 283
article thumbnail

Operational Technology Threats in Automotive: What You Need to Know

Tenable

When it comes to automotive manufacturing, industrial control systems (ICS) may be the weak link inviting new types of attacks. Legacy ICS in the automotive industry has proven to be durable, but this durability has become a security risk in today’s connected world. Cybersecurity challenges in auto manufacturing.

article thumbnail

What to expect from cybersecurity in 2023

Capgemini

What to expect from cybersecurity in 2023 Geert van der Linden 20 Dec 2022. As we enter 2023, it goes without saying that cybersecurity teams have a lot on their plate, and you’d be forgiven for feeling we live in an age of permacrisis. In response, more organizations are waking up to the value of cybersecurity investment.

article thumbnail

Ford’s high-tech business transformation, fueled by cloud

CIO

Fueled by cloud Ford’s cloud journey, which began roughly a decade ago, continues to this day, Musser says, as the automaker seeks to take advantage of advances in the key technologies fueling its transformation, including the internet of things (IoT), software as a service, and the latest offerings on Google Cloud Platform (GCP).