Sunday, December 15, 2019
  • DEF CON 27, Social Engineering Village, Daniel Isler’s ‘The Voice Told Me To Do It’
  • The Joy of Tech®, ‘Look, Up In The Apple Store… It’s Super Monitor’
  • DEF CON 27, Social Engineering Village, Chris Pritchard’s ‘The Basics of Social Engineering’
  • Understanding Policies: Disable Guest Account and Built-in Guest Account Status
  • The Top 20 Security Predictions for 2020

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Careers Security Awareness Security Bloggers Network 

Home » Cybersecurity » Careers » Self-Driving Cars: How Automakers can Overcome Cybersecurity Issues

Self-Driving Cars: How Automakers can Overcome Cybersecurity Issues

by Tripwire Guest Authors on December 30, 2018

A lot has been going on with autonomous vehicles these days. Almost every famous car manufacturer seems to be in a rush to master the perfected version of self-driving cars. While most people believe that fully autonomous vehicles are still in their infancy stage, manufacturers think that they will dominate the roads by 2020.

The problem with autonomous cars is not the manufacturing process itself but the volume of probable outcomes that could arise from even the tiniest of miscalculations. However, governments and manufacturers have more to worry about than just manufacturing defects. What really bothers us – when it comes to traveling in self-driving vehicles is their security, i.e., the ability to ward off cybercriminals.

As the Internet of Things (IoT) is an embedded feature that can help cars of the future navigate through busy roads, making split-second decisions, the risks of falling prey to a malicious hacker is likely the most significant concern manufacturers we face going forward.

An autonomous car is already facing growing controversy over its safety and ethical decision-making capabilities. Critics have warned that self-driving vehicles would fail ethical testing in various scenarios. Some autonomous cars during the testing phase got involved in collisions and made poor moral decisions. Hence, there is a growing concern over structuring policies and legislation to accommodate legal action against cars that can be driven independently.

With a vehicle that is programmed to increase passenger safety and improve road safety in general, what happens when such cars make mistakes? Who should be held accountable for a collision in such cases? How would an autonomous vehicle react when it has to choose between the passenger’s safety and the pedestrians? All these questions have raised eyebrows for many. However, that is not the only challenge manufacturers’ face when it comes (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/featured/self-driving-cars-cybersecurity-issues/

December 30, 2018December 30, 2018 Tripwire Guest Authors cars, Featured Articles, Hacking, security, Security Awareness, self-driving
  • ← SecureWV/Hack3rCon 2018, Adam Vincent’s ‘Securing Your networks With Ansible’
  • The Top 10 Tripwire Blogs of 2018 →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Microsoft Highlights The Risk of Stolen Passwords

Enzoic

Enzoic Customer Profile: IDShield

Enzoic

Old vs. New Methods for Employee Password Hardening

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Predictions 2020: Don’t Forget the Current Threats
Trend Micro Looks to the Cloud for Security
Encryption Wars, Part IV: Barr vs. Big Tech
Cyberattacks: Top 5 Ways You Could Be Hacked in 2020
Hacking Ring Security Cameras: Amazon Makes it Easy
Behshad Rejai on the past, present, and future of software development
Maze Ransomware Used in Pensacola Cyber Attack
Data Security Incident Disclosed by Cheyenne Regional Medical Center
Top 5 Cybersecurity Trends to Prepare for in 2020
How Hackers Get Our CVV Numbers | Avast

Upcoming Webinars

There are no upcoming webinars at this time.

Download Free eBook

Open Source Security: Weighing the Pros and Cons

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Cyberattacks: Top 5 Ways You Could Be Hacked in 2020
Cybersecurity Industry Spotlight Security Awareness Security Boulevard (Original) 

Cyberattacks: Top 5 Ways You Could Be Hacked in 2020

December 13, 2019 Michael Bruemmer | 2 days ago 0
Predictions 2020: Don’t Forget the Current Threats
Cybersecurity Industry Spotlight Network Security Security Boulevard (Original) 

Predictions 2020: Don’t Forget the Current Threats

December 12, 2019 Craig DAbreo | 3 days ago 0
Predictions 2020: Data Security Next Year and Beyond
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Predictions 2020: Data Security Next Year and Beyond

December 10, 2019 Ameesh Divatia | Dec 10 0

Top Stories

Hacking Ring Security Cameras: Amazon Makes it Easy
Cybersecurity Endpoint Featured Identity & Access IoT & ICS Security News Security Boulevard (Original) Spotlight 

Hacking Ring Security Cameras: Amazon Makes it Easy

December 13, 2019 Richi Jennings | 2 days ago 0
Cyberhaven Applies Behavioral Analytics to Better Secure Data
Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight 

Cyberhaven Applies Behavioral Analytics to Better Secure Data

December 12, 2019 Michael Vizard | 3 days ago 0
Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | Dec 06 0

Security Humor

via    the Comic Noggins of  Nitrozac  and  Snaggy  at  The Joy of Tech®

The Joy of Tech®, ‘Look, Up In The Apple Store… It’s Super Monitor’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.