OnBoard Security InSights

V2X Announcements at CES 2019

Posted by Gene Carter on Jan 15, 2019 9:58:39 AM

The annual Consumer Electronics (CES) conference has become a major show for automakers and suppliers to highlight the latest and greatest technological advances in cars. The past few years, there have been many announcements and demonstrations of Vehicle-to-Everything (V2X) communications, primarily using a Wi-Fi-based technology called Dedicated Short Range Communications (DSRC). The year marked a turning point, as a majority of the V2X announcements were based on Cellular V2X (C-V2X).

Read More

Topics: Automotive, Internet of Things, V2X, Autonomous Vehicles, V2V, Connected Vehicles, DSRC, V2I

2018: A Year of Successful Growth for OnBoard Security

Posted by Gene Carter on Dec 18, 2018 10:07:14 AM

2018 has been an eventful year for OnBoard Security® and the markets we serve. The year started with a bang when OnBoard Security was spun off from Security Innovation®, becoming an independent company with the mission to help Automotive and IoT manufacturers stay ahead of the curve in cyber security. As an independent company, we are better positioned to focus on filling critical cyber security gaps in our target markets.

Read More

Topics: Cryptography, Automotive, Privacy, Internet of Things, V2X, Embedded Security, Autonomous Vehicles, Cyber Security, TPM, TSS, Trusted Computing, V2V, SCMS, Research, Connected Vehicles, DSRC, Blockchain, V2I

Setting Security Goals and Requirements

Posted by Lee Wilson on Aug 16, 2018 12:57:00 PM

To get a clear view of your security goals and requirements it is very useful to categorize your project into one of four target environments.  

Read More

Topics: Privacy, Internet of Things, Cyber Security

Four Simple Software Models To Built System Security

Posted by Lee Wilson on Aug 7, 2018 5:55:00 PM

Every day, thousands of new devices are given internet connectivity - called the Internet of Things (IoT).   Figure 1 displays IoT devices attacked worldwide in 2015. Most of the internet connected devices are inherently insecure and hackers realize this as an easy opportunity.  Even though home routers were the most targeted devices, others weren’t spared.

Read More

Topics: Internet of Things

Whitepaper: Setting and Achieving Security Design Goals

Posted by Lee Wilson on Aug 6, 2018 12:53:00 PM

This whitepaper provides a framework on system security design and the security software needed to achieve a system’s security goal.  Four software models are examined and critiqued, with recommended strategies for choosing vendors within those differing models.

Read More

Topics: Internet of Things, Cyber Security

Top-Down and Bottom-Up Defenses to Secure IoT

Posted by Lee Wilson on May 24, 2018 12:14:38 PM
Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin. To add to the confusion, some security vendors will claim their firewall or password system or a “magic bullet” will protect your system from every type of attack. Don’t believe the hype.
Read More

Topics: Cryptography, Internet of Things, Embedded Security, Cyber Security, TPM, TSS

Trusted Computing Primary Use Cases

Posted by Lee Wilson on May 17, 2018 1:18:08 PM

There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.

Read More

Topics: Internet of Things, Embedded Security, Cyber Security, TPM, TSS, Trusted Computing

TPM - a Powerful, Inexpensive Security Building Block

Posted by Lee Wilson on Mar 22, 2018 1:51:50 PM

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.

Read More

Topics: Cryptography, Internet of Things, Embedded Security, Cyber Security, TPM, TSS, Trusted Computing

Learn About the Latest in IoT Security from Our Team of Experts

 

OnBoard Security's security experts share insights on the latest security topics in:

  • Connected Cars
  • Autonomous Vehicles
  • Internet of Things
  • Quantum Computing

Subscribe to Email Updates

Recent Posts