Fill form to unlock content
Loading, please wait
Error - something went wrong!
Unlock Content
Thank you!
Lesson 3 – Vulnerabilities Beyond the Vehicle
Connected cars are vulnerable to a multitude of potential attack vectors - including many beyond the vehicle itself. Scott Register, Keysight’s VP of Security Solutions, has more.