From August 23rd to 26th, GoGoByte team participated in the “OSRCTF”, which attracted research teams from universities and security testing labs of famous enterprises, covering topics such as IoT vulnerabilities and attack methods, chip fault injection, and side channel analysis. After four days of fierce competition, the GoGoByte team won the second prize of the competition by its profound technical experience in the cybersecurity industry.
On the 27th, Li Jun, the founder of GoGoByte, was invited to participate in the Hardware Security Frontier Technology Forum and delivered a speech on “Connected Vehicles Security – How far is it from Silicon to Cloud?”
Li Jun explained that in order to protect the network security of the vehicle, not only do we need layers of gate-keeping from silicon to cloud, but also to make security awareness have a real impact on the people.
Currently, the development of connected vehicles is entering the “cloud”, incidents are breeding like flies, and compliance challenges are becoming more and more severe. In the face of new challenges, the automotive industry needs to put security awareness into action and invest more resources as well as energy into cybersecurity; the security industry is required to understand the dilemma of the automotive industry and empower customers with cybersecurity capabilities in a collaborative manner.
With many years drilling in security research experience and the background of automotive industry, GoGoByte is able to bridge the gap between the two industries, help automotive companies build a full lifecycle security management system, and provide elegant cybersecurity solutions and services.
Currently, GoGoByte is actively building a global partner ecology, working together with security partners in the fields of chips, modules, communications, cloud, etc. to provide customers with a full range of security solutions and services, escorting the automotive industry to achieve high-quality security development.
Meanwhile,GoGoByte’s R&D team is developing a connected cybersecurity management system to provide full lifecycle full technology stack security capabilities, including security design assistance, security compliance, security testing and verification, and security operations.