With the explosion of electronics—from ECUs to interfaces—making their way into vehicles, how can manufacturers protect their designs against cyberattacks?
The Trusted Computing Group maintains a library of specifications (most recently TPM 2.0) to combat the growing sophistication of cybersecurity threats worldwide.