IoT
12/13/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Upstream Security Secures $9 Million Series A Funding Round

Focuses on ramping up its cloud-based cybersecurity for connected and autonomous car fleets.

HERZLIYA, Israel – Upstream Security, pioneer of the cloud-based cybersecurity platform for connected cars and autonomous vehicles, today announced the closing of $9 million in Series A funding, led by CRV (Charles River Ventures). The round included expanded investments from Israeli-based Glilot Capital Partners and Maniv Mobility. Following a $2 million seed funding round in June, the company will use the latest investment to expand its R&D program and continue building out its world-class engineering and security research teams, and open marketing and sales offices in the United States and Europe. The company is well-resourced to secure the 60 million connected cars on the road today that include commercial trucks, vans, buses and private vehicles, as well as take advantage of the imminent explosion in connected vehicles—Gartner expects there will be 250 million connected vehicles by 2020.

 "Connected and semi-autonomous cars are already a reality, so it’s a matter of ‘when’ not ‘if’ these self-driving technologies will be deployed at scale. Upstream’s engineers were the first to solve how to protect connected cars and autonomous vehicles using the cloud, crucial for near-term and future deployment of automotive cybersecurity at the fleet level," said Izhar Armony, general partner at CRV. "We believe in Upstream’s groundbreaking approach to secure connected and autonomous vehicles and in the abilities of cybersecurity veterans, Yoav Levy and Yonatan Appel, to build a rapidly growing business in this hot, emerging space."

As connected and autonomous driving technologies become mainstream, security attacks on vehicle fleets––groups of motor vehicles owned or leased by a business, government agency or other entity––are likely to increase drastically. Upstream’s cloud-based approach to automotive cybersecurity leverages artificial intelligence and machine learning that is applied to the tremendous data sets continuously produced by vehicles. This provides customers with data protection, anomaly detection and real-time analytics of cyber attacks and vehicle fleet health. By centralizing cybersecurity in the cloud instead of in-vehicle, threats are detected and prevented before they even reach a vehicle's network.

More cars are connected to the Internet today than ever before, driving hackers to develop new and more efficient ways to infiltrate and disrupt automotive software. Today’s automotive cybersecurity solutions are in-vehicle and suffer from slow production cycles, which impede their agility as well as their ability to protect against the most recent cybersecurity threats. Upstream’s unique solution offers non-intrusive protection, effectively securing cars that are already on the road today and upgradable to stand against new cybersecurity threats and vulnerabilities in the future.

“The automotive industry is going through a massive disruption. Consequently, security solutions for the car are undergoing rapid advances at an unprecedented rate. We’re using emerging technologies like AI and machine learning to carry out an evolutionary leap in cybersecurity for passenger and commercial vehicles,” said Upstream CEO and cofounder, Yoav Levy. “Riding the wave of momentum from our recent company launch and early customer wins, this new investment round further validates our technology and approach, and will fuel our commitment to be the leading force of innovation in security for connected and autonomous transportation.”

Upstream is planning to open offices in Silicon Valley in the coming months.

In addition to this news, Levy recently spoke at KPMG’s 8th annual automotive executive forum, the 2017 Los Angeles Auto Show, which announced new research in vehicle fleet security.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
The Browser Is the New Endpoint
Rajesh Ranganathan, Product Manager at ManageEngine,  10/23/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.