Tag Archive for: expand

Automotive Cyber Security Market Is Estimated To Expand At


Automotive Cyber Security Market

Automotive Cyber Security Market

Automotive Cyber Security Market overview

By 2028, the Automotive Cyber Security Market is estimated to be worth USD 8.94 billion, recording a CAGR of 18.56% during the predicted period (2021 – 2028). The market was valued at a rate of USD 2.16 billion in 2020. The choices, preferences and desires of drivers are rapidly changing. Consumers are now expecting personalized experiences, so the vehicle industry is adapting the technique to meet those demands. More software results from increased personalization and connectedness, which means more vulnerability.

Connected vehicles can function similarly to smartphones and smart appliances. The sharing of internet and wireless network access with other vehicles and external equipment can send and receive data. New and advanced software is already providing greater features and capabilities to fulfill the needs and expectations of drivers. In such cases, automobile cybersecurity is serious, and it should be a part of the design process.

The factors that are estimated to drive the growth of the automotive cybersecurity market are an increase in the need for automotive cybersecurity, government initiatives for implementing connected car technology, and mandatory cybersecurity standards. However, the increase in the development of common podiums is leading to high risks, and the challenge is making the applications secure, which restrains the market growth. However, improving vehicle security using adaptive security and increasing the complexity of cars’ electronic systems are estimated to offer profitable growth opportunities for the market players.

Request Free Sample of Report @ https://www.marketresearchfuture.com/sample_request/2970

The outbreak of covid-19 forced governments across the globe to impose strict lockdowns and made social distancing mandatory to stop the virus from spreading. This resulted in a drop of demand for new vehicles significantly. However, the automotive industry also had a slow production rate; there was a reduction in the supply of raw materials and breakage in the supply chains globally. The losses observed by the automotive sector have affected the…

Source…

Detectify secures $10M more to expand its ethical hacking platform • TechCrunch


Detectify, a security platform that employs ethical hackers to conduct attacks designed to highlight vulnerabilities in corporate systems, today announced that it raised $10 million in follow-on funding led by Insight Partners. CEO Richard Carlsson says that the new cash, which brings Detectify’s total raised to $42 million, will be put toward product development and improving the overall user experience.

Detectify was founded by four ethical hackers from Stockholm, including Carlsson, who realized the business potential in combining security research with automation. In an interview with TechCrunch, Carlsson pointed out that product development workflows have changed dramatically over the past few years, with new teams within organizations spinning up internet-facing apps and adding potentially vulnerable assets to their employer’s environment. The trend toward low- and no-code tools has lowered the app development barrier to entry, but it’s also made the jobs of security specialists that much harder.

Illustrating the challenges, a recent Dark Reading survey found that 26% of IT and security experts don’t trust the platforms used to create low- and no-code apps. Roughly as many — 25% — said that they don’t even know which apps within their companies are being created by these tools.

“While companies should integrate security best practices earlier in their development cycle and try to catch vulnerabilities in development, production is what truly matters,” Carlsson added via email. “Unless you have a completely linear development process, which no company actually has, you will never catch everything. And this legacy mindset and over-reliance on ‘shifting left’ instills a sense of false confidence in organizations that actually increases their risk level.”

Detectify

Image Credits: Detectify

Detectify’s approach crowdsources real payloads — pieces of code that execute when a hacker exploits a vulnerability — from a private community of ethical hackers and uses these contributions for payload-based tests. Carlsson claims that Detectify tests customers’ entire attack surfaces, exposing how malicious attackers might exploit…

Source…

SEC Proposes To Expand Cybersecurity Obligations Of Registered Investment Advisers And Registered Funds – Technology


The SEC recently proposed a series of new rules and amendments (the Proposed Rules)
under the Investment Advisers Act of 1940 and the Investment
Company Act of 1940 concerning cybersecurity risk management for
registered investment advisers (registered advisers) as well as
registered investment companies (registered funds). If adopted,
these rules would require registered advisers and registered funds
to implement extensive written cybersecurity policies and
procedures and significantly augment their cybersecurity reporting,
disclosure and recordkeeping obligations. Coming on the heels of
SEC Chair Gary Gensler’s recent vow to improve the
“overall cybersecurity posture and resiliency of the financial
sector,” the Proposed Rules are the latest demonstration of
the SEC’s heightened focus on bolstering regulations to better
prevent and respond to cybersecurity attacks on securities markets.
Issuance of the Proposed Rules is also driven by the SEC’s
expressly stated concern that, notwithstanding observations the SEC
has made in recent risk alerts and enforcement actions, registered
advisers and registered funds have not adopted reasonably designed
cybersecurity programs to sufficiently address an increasingly
sophisticated and volatile cyberthreat landscape.
Comments on the Proposed Rules are due on the later of
April 11, 2022 or 30 days after their publication in the Federal
Register.

Background on Registered Advisers and Registered Funds

The Proposed Rules would impose substantially similar
obligations on registered advisers—such as money managers,
investment consultants and financial planners—and registered
funds—such as mutual funds, exchange-traded funds, registered
closed-end funds, business development companies, and unit
investment trusts—but there are some distinctions,
particularly with respect to reporting and disclosure requirements.
While both registered advisers and registered funds would be
obligated to disclose significant cybersecurity incidents to
clients and investors, only registered advisers would be required
to report such incidents to the SEC. Because registered advisers
would have to report incidents of their fund…

Source…

Hacking For Defense planners look to expand beyond military problems


For the last five years, Army veteran Alex Gallo and the Common Mission Project have been partnering with military officials to use teams of college students in solving a host of equipment and personnel challenges at the Defense Department.

Now the team wants to expand that idea to the rest of the world’s problems too.

“We’re doing programs on hacking for the oceans and the environment and hacking for climate and sustainability at five different universities already,” said Gallo, co-founder and executive director of CMP. “In society today, we solve too many problems in silos. This is a way to bring different groups together in a constructive problem solving process.”

The group’s Hacking For Defense program has drawn headlines in recent years for its unusual approach to Pentagon problems, with programs at more than 50 college campuses, including England.

Teams of college students — would-be engineers, computer scientists, public policy specialists and more — work together for a semester on an issue presented by military partners, with the goal of finding outside-the-box solutions.

Recent topics tackled with help from the the National Security Innovation Network include developing anti-drone technology for special forces vehicles, improving portable batteries for personal battlefield use, and improving mental health support for military specialists facing higher rates of suicide.

Gallo, who served as an Army officer in Iraq, said the value of having individuals outside the military evaluate and propose answers to those problems is they aren’t limited by military preconceptions about what the solutions should be

“When we arrived in Kuwait before entering into Iraq, we got a lot of cool equipment,” he said. “And our soldiers tried it out in the desert. And when we went into Iraq, that stuff stayed in storage for an entire year.

“It was all solutions in search of problems. We had a ton of problems in Iraq that year, but none of what they gave us solved our problems.”

Students in the course (more than 500 have gone through the program so far) meet with front-line troops as well as military planners and leaders throughout the semester, to better understand…

Source…