White paper on cybersecurity & privacy in connected and cooperative mobility

The next generation of vehicles will be communicating with each other, with road-side systems, and will be continuously connected to various networks. Many services will be offered to the drivers via, both in car and via handheld devices like smart phones that will be seamlessly integrated into the vehicles’ systems. In this whitepaper, we summarize the challenges and privacy & security work taking place in this area. We highlight the complexity of the problems, communication technologies being used, and the security challenges we face together with some possible solutions.

Spotlight

Swoscom AB

We help companies to simplify, streamline and secure the use of cloud services by relieving the administration, control and maintenance of the services. Our customers get access to the services they need from well-known cloud services such as Office 365, G-Suite, Azure, Amazon, Google Cloud or customized services from our own data centers without having to administer or understand the inner workings of the services themselves.

OTHER WHITEPAPERS
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More
news image

FortiClient Data Sheet

whitePaper | July 12, 2023

FortiClient’s Fortinet Security Fabric integration provides endpoint visibility through telemetry and ensures that all Security Fabric components – FortiGate, FortiAnalyzer, EMS, managed APs, managed Switches, and FortiSandbox – have a unified view of endpoints in order to provide tracking and awareness, compliance enforcement, and reporting. Traditional virtual private network (VPN) tunnels or new, automatic ZTNA tunnels provide secure remote connectivity. Provide security and protection for endpoints when local or remote.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More

Spotlight

Swoscom AB

We help companies to simplify, streamline and secure the use of cloud services by relieving the administration, control and maintenance of the services. Our customers get access to the services they need from well-known cloud services such as Office 365, G-Suite, Azure, Amazon, Google Cloud or customized services from our own data centers without having to administer or understand the inner workings of the services themselves.

Events