Mobile Phone Security
Mobile Phone Consultancy
Mobile Phone Security
Software
Mobile Security Leaflet
InnOvaTe_Launchpad_2016_Prize_Winner_with_pic_v4

automotive

Automotive threat modelling: off-the-shelf solutions

The availability of commercial tools primed with domain-specific knowledge illustrates how threat modelling has begun to focus on the needs of Tier 1 suppliers and OEMs. James Tyrrell shines a light on the use of off-the-shelf solutions and identifies opportunities for collaboration across the automotive threat modelling community. Continue reading

Threat modelling connected and autonomous vehicle cybersecurity: an overview of available tools

Automotive industry standards recommend threat modelling as a key element in strengthening the cybersecurity of road vehicles. In the second in our series of automotive blog posts, James Tyrrell provides an overview of available tools from simple drawing and flow-charting applications through to more automated threat-generation solutions with built-in libraries and templating options. Continue reading

Computers on wheels and networks in the fast lane

CAN bus, LIN, MOST, FlexRay and automotive Ethernet - what are the sweet spots for in-vehicle communications and how do the different components fit together? Continue reading

Copper Horse and Arm launch white paper on IoT security by design

“If you're looking to deploy IoT, you need to do it right from the start and you need to think about what happens with that product throughout its lifetime, until you sunset it,” David Rogers MBE – founder of Copper Horse and author of the UK’s Code of Practice for Consumer IoT Security – told listeners at yesterday’s launch webinar (available to watch on-demand). “That means working with suppliers and partners who you can trust will take the right approach to security and platforms.” Continue reading

Vehicle Communications and the Road to Driverless Automotive

Copper Horse’s Development Lead, Mark Neve discusses technology being deployed in the vehicle comms space.

 

The car of tomorrow is going to be communicating with many different things and not just for passenger entertainment. The field of Vehicle-to-“X” communications is growing considerably. The X can mean Vehicle-to-Vehicle (known as V2V) or Vehicle-to-Infrastructure (V2I) and even V2P – Vehicle to Pedestrian or V2B – Vehicle to Bike, with many different applications within. The opportunities to improve road safety are enormous but the security and safety implications of getting it wrong are equally as important. This is something that we’re looking… Continue reading

spacer

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations. We offer security training and have a huge range of consulting expertise to help you in mobile telecoms and connected products security. If you have an interesting and complex security problem, we are here to help.

Copper Horse Tweets

Follow @copperhorseuk on twitter.

GSMA Associate Member

GSMA Associate Member

Copper Horse is an Associate Member of the GSM Association

IoT Security Foundation

IoT Security Foundation

Copper Horse are Founding and Executive Board member of the IoT Security Foundation.

Cyber Essentials Certified

Cyber Essentials Certified