Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

Автор: RunSafe Security Inc.

Загружено: 2025-12-18

Просмотров: 43

Описание:

As vehicles evolve into always-connected, software-defined systems, cybersecurity decisions increasingly shape privacy, safety, and trust on the road.

In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and special guest Sean McKeever, Global Product Cybersecurity Lead at Marelli, for a candid discussion on what it really means to secure modern vehicles. Sean brings deep industry experience to unpack how OEMs and suppliers are navigating data stewardship, autonomous testing, vehicle theft, and diverging global regulations.

Together, Paul, Joe, and Sean explore:

• What constant connectivity means for driver privacy and data stewardship
• The risks of beta-testing autonomous systems on public roads
• How car theft has shifted from physical break-ins to software exploitation
• Why U.S. and EU cybersecurity regulations take fundamentally different approaches
• The importance of collaboration across OEMs, suppliers, and regulators

From RF relay attacks to software-defined vehicles with decade-long lifecycles, this episode highlights why cybersecurity is no longer an add-on but a core design decision shaping the future of mobility.

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats

When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats

Smart Carts, Real Revenue

Smart Carts, Real Revenue

FreshEd #408 – From the Former Soviet Union to Canada (Niyozov, Bahry & Antony-Newman)

FreshEd #408 – From the Former Soviet Union to Canada (Niyozov, Bahry & Antony-Newman)

Debt, Leverage & Personal Banking: A Better Way to Think About Money, With Michael Hession

Debt, Leverage & Personal Banking: A Better Way to Think About Money, With Michael Hession

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Designing Security into Life-Critical Devices: Where Innovation Meets Regulation

Designing Security into Life-Critical Devices: Where Innovation Meets Regulation

Акунин ошарашил прогнозом! Финал войны уже решён — Кремль скрывает правду

Акунин ошарашил прогнозом! Финал войны уже решён — Кремль скрывает правду

Why More Towns Are Saying 'No, Thanks' To Data Centers | Growth Stories | IBD

Why More Towns Are Saying 'No, Thanks' To Data Centers | Growth Stories | IBD

Health UnaBASHEd: Risk, Resilience, and the Future of Medicine with Michael Rosenblatt, MD

Health UnaBASHEd: Risk, Resilience, and the Future of Medicine with Michael Rosenblatt, MD

Episode 53: You Don't Have to Leave to Lead: Dr. Chris Jochum's Leadership Journey

Episode 53: You Don't Have to Leave to Lead: Dr. Chris Jochum's Leadership Journey

"The Overthrow" from The Premier League Cricket Club - The EMERGENCY EPISODE!

Animal health as a climate solution with Nick Wheelhouse, Edinburgh Napier Univeristy

Animal health as a climate solution with Nick Wheelhouse, Edinburgh Napier Univeristy

Top 5 Financial Myths We Busted in 2025

Top 5 Financial Myths We Busted in 2025

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries

The Asymmetric Advantage: How Cybersecurity Can Outpace Adversaries

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

Почему Азовское море — самое опасное в мире

Почему Азовское море — самое опасное в мире

Понимание GD&T

Понимание GD&T

Digital Entrepreneur Ken Cook talks about The Prepared Group

Digital Entrepreneur Ken Cook talks about The Prepared Group

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]