{"id":11338,"date":"2018-10-22T09:11:36","date_gmt":"2018-10-22T08:11:36","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11338\/"},"modified":"2020-01-02T11:26:42","modified_gmt":"2020-01-02T10:26:42","slug":"connected-cars-vivatech","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/","title":{"rendered":"Connected cars: When cybersecurity comes into play"},"content":{"rendered":"<p><em>On the occasion of the cybersecurity month and while the Mondial Paris Motor Show has just closed down,<\/em><\/p>\n<p><em>Here is a little background on the study released during the Vivatech event dedicated to startup and technological innovation, called &#8220;<a href=\"https:\/\/www.wavestone.com\/en\/insight\/startups-future-road-mobility\/\">How are startups shaping the future of road mobility?<\/a>&#8221; in which a chapter was dedicated to cybersecurity.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The automotive industry must now consider\u00a0cybersecurity as an integral part of how\u00a0cars are built, just as physical safety became\u00a0a critical part of how cars were built in the\u00a0late 20th century.<\/p>\n<p>Many people in this field caught on leading to the creation of many startups on the\u00a0topic. Today, no less than 20 startups try to\u00a0provide solutions to face automotive cyber risks.<\/p>\n<p>&nbsp;<\/p>\n<h2>Cybersecurity, yes, but with a different approach<\/h2>\n<p>Those startups show that the challenges to\u00a0be handled are almost the same as those\u00a0usually encountered in other sectors but\u00a0need to be addressed differently.<\/p>\n<p>Due to the current specificities and\u00a0constraints related to the automotive industry and connected car in particular,\u00a0startups are having to adapt existing cybersecurity concepts and solutions while innovating including:<\/p>\n<ul>\n<li>Manufacturing costs;<\/li>\n<li>Proprietary and specific technologies for embedded materials, with little security originally integrated (e.g. CAN \u2013 Controller Area Network);<\/li>\n<li>Systems with long lifetime and complicated upgrade capacity;<\/li>\n<li>Limited processing capacity;<\/li>\n<li>Architecture complexity.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11344 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/image-1.png\" alt=\"\" width=\"975\" height=\"707\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/image-1.png 975w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/image-1-263x191.png 263w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/image-1-768x557.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/image-1-54x39.png 54w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p><b>4 main cybersecurity objectives <\/b>are addressed by startups in the field, through the products and services they propose:<\/p>\n<ul>\n<li><strong>protect hardware, firmware and software<\/strong>, as well as related processed-data which is a true challenge especially when having to implement cryptography mechanisms requiring significant computational<\/li>\n<li><strong>ensuring only legitimate communications<\/strong> are allowed to ensuring no-one is able to take unauthorized control of\u00a0 a car, while protecting data in transit which is essential for privacy;<\/li>\n<li><strong>detecting abnormal events and reacting<\/strong> accordingly in order to prevent any intrusion or cyber attacks on a car as well as a whole fleet;<\/li>\n<li><strong>managing systems lifecycle<\/strong>, particularly related-vulnerabilities is\u00a0 becoming a major concern all the more so when a car has a 15 to 20 year life;<\/li>\n<\/ul>\n<p>It appears clearly that intrusion detection and threats prevention are two of the most covered topics as <b>70%<\/b> of the automotive cybersecurity startups are offering related solutions. One can say that the market and car manufacturer kept in mind what happened to the Jeep Cherokee. However this figure may originates from the fact that is probably easier to provide security at the car boundary rather to integrate cybersecurity in the current constraint in-vehicle architecture and components.<\/p>\n<p>One another key point is that vehicles\u00a0have a lot in commons and share, for some\u00a0aspects, the same characteristics with\u00a0the Internet Of Things. That\u2019s why it is not\u00a0surprising to see startups like Prove&amp;Run or IoT.BZH coming from this world and\u00a0offering embedded software and hardware\u00a0oriented security services and solutions to the automotive market.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2>Cybersecurity startups anticipate future connected car architectures<\/h2>\n<p>Even if startups mainly offer solutions and services to secure existing systems and architectures within modern vehicles, there is a trend today showing some of them are anticipating and building cybersecurity solutions for the forthcoming systems and architectures.<\/p>\n<p>The startup Argus Cyber Security* is a good example. One of its first products was the \u201cCAN firewall\u201d, to protect the historical CAN network which is still the reference protocol in\u00a0 current vehicles. The startup has since developed new solutions like the \u201cIn-Vehicle Network Protection Suite\u201d to support a wide array of network protocols \u2013 CAN and CAN-FD, FlexRay, Ethernet (with SOME\/IP, DoIP etc.), etc. \u2013 and thus defend current and future vehicle architectures.<\/p>\n<p>Another example is Arilou Technologies*, which recently designed a new cybersecurity tool called the \u201cEthernet Security Hub\u201d especially for protecting future connected and autonomous vehicles equipped with Ethernet networks rather than CAN networks.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<h2>Major actors invest\u00a0in startups at an unprecedented\u00a0pace<\/h2>\n<p>The ongoing creation of cybersecurity startups in the automotive industry over the past years highlights the fact that cybersecurity has become a top concern in the sector.<\/p>\n<p>Established automotive companies, like car\u00a0and equipment manufacturers, know this well.<\/p>\n<p>Some focus on hiring new talents and\/or\u00a0developing technologies in-house but most\u00a0of them are very aggressive in investing or\u00a0buying startups at an unprecedented pace.\u00a0Are they afraid of the potential competition?\u00a0Are they unable to provide these innovations with their own R&amp;D teams? Do they want to<br \/>\naccelerate with the integration of new ways of working and new teams? The answer is\u00a0certainly a combination of these 3 factors\u00a0as the connected and autonomous car\u00a0represents a major shift in their organization and strategy.<\/p>\n<p>This fast movement is clearly visible when looking at the list of the latest startups acquisitions below:<\/p>\n<ul>\n<li>Founded in 2013, ADVANCED TELEMATIC SYSTEMS was acquired by HERE in 2018;<\/li>\n<li>Founded in 2013, ARGUS CYBER SECURITY was acquired by Continental in 2017;<\/li>\n<li>Founded in 2012, TRUSTPOINT INNOVATION TECHNOLOGIES was acquired by ETAS (Bosch) in 2017, which had already acquired the cybersecurity company Escrypt in 2012;<\/li>\n<li>Founded in 2012, TOWERSEC was acquired by Harman in 2016, which was in turn acquired by Samsung in 2017;<\/li>\n<li>Founded in 2010, ARILOU TECHNOLOGIES was acquired by NNG in 2016;<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<p>In addition to these acquisitions, many actors also invest in startups and build\u00a0partnerships with them, like Denso for\u00a0example, which recently invested over $2 Million in Dellfer, a startup that was founded in 2016.<br \/>\nBesides, startups are not the only ones to\u00a0be concerned. Some established companies in the field are also concerned, highlighting\u00a0the market dynamism on the topic. For\u00a0instance, Thales and Vector recently formed\u00a0a joint-venture to work on addressing cybersecurity challenges related to the connected and autonomous car.<\/p>\n<p>&nbsp;<\/p>\n<h2>A new\u00a0area of risks is rising<\/h2>\n<p>The arrival of autonomous cars is a new\u00a0challenge for cybersecurity. Many new risk\u00a0scenarios will have to be taken into account,\u00a0mainly in the field of attacks on artificial intelligence, advanced sensors security and\u00a0even automated response to cyber events.<\/p>\n<p>To face this new challenge, solutions are only\u00a0at a development phase and not particularly\u00a0dedicated to the automotive sector. Many\u00a0researchers like Nicolas Papernot or Ian\u00a0Goodfellow are currently working on how to prevent Adversarial Attacks which aim at\u00a0deceiving AI and which could lead, if applied to an autonomous car, to safety issues.<\/p>\n<p>Breakthrough solutions are probably being\u00a0developed by startups from the Zeroth. AI accelerator, an Artificial Intelligence\u00a0and Machine Learning focused startup\u00a0accelerator.<\/p>\n<p>Although they will undoubtedly provide bleeding edge solutions to these complex\u00a0problems, no one has declared working on the automotive field yet.<\/p>\n<p>Certainly, cybersecurity and safety will have to be addressed jointly to make autonomous vehicles a reality.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the occasion of the cybersecurity month and while the Mondial Paris Motor Show has just closed down, Here is a little background on the study released during the Vivatech event dedicated to startup and technological innovation, called &#8220;How are&#8230;<\/p>\n","protected":false},"author":188,"featured_media":10345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3274],"tags":[3336],"coauthors":[1257,2719],"class_list":["post-11338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0-en","tag-manuf-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Connected cars: When cybersecurity comes into play - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connected cars: When cybersecurity comes into play - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"On the occasion of the cybersecurity month and while the Mondial Paris Motor Show has just closed down, Here is a little background on the study released during the Vivatech event dedicated to startup and technological innovation, called &#8220;How are...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-22T08:11:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony di Prima\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony di Prima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\"},\"author\":{\"name\":\"Anthony di Prima\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\"},\"headline\":\"Connected cars: When cybersecurity comes into play\",\"datePublished\":\"2018-10-22T08:11:36+00:00\",\"dateModified\":\"2020-01-02T10:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\"},\"wordCount\":1095,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg\",\"keywords\":[\"manuf &amp; industry 4.0\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\",\"name\":\"Connected cars: When cybersecurity comes into play - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg\",\"datePublished\":\"2018-10-22T08:11:36+00:00\",\"dateModified\":\"2020-01-02T10:26:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Vector car rental or sale concept in flat style - hand holding car key\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Connected cars: When cybersecurity comes into play\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\",\"name\":\"Anthony di Prima\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Connected cars: When cybersecurity comes into play - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/","og_locale":"en_US","og_type":"article","og_title":"Connected cars: When cybersecurity comes into play - RiskInsight","og_description":"On the occasion of the cybersecurity month and while the Mondial Paris Motor Show has just closed down, Here is a little background on the study released during the Vivatech event dedicated to startup and technological innovation, called &#8220;How are...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/","og_site_name":"RiskInsight","article_published_time":"2018-10-22T08:11:36+00:00","article_modified_time":"2020-01-02T10:26:42+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Anthony di Prima","twitter_misc":{"Written by":"Anthony di Prima","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/"},"author":{"name":"Anthony di Prima","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96"},"headline":"Connected cars: When cybersecurity comes into play","datePublished":"2018-10-22T08:11:36+00:00","dateModified":"2020-01-02T10:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/"},"wordCount":1095,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg","keywords":["manuf &amp; industry 4.0"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/","name":"Connected cars: When cybersecurity comes into play - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg","datePublished":"2018-10-22T08:11:36+00:00","dateModified":"2020-01-02T10:26:42+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/02\/Fotolia_71594375_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"Vector car rental or sale concept in flat style - hand holding car key"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/10\/connected-cars-vivatech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Connected cars: When cybersecurity comes into play"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96","name":"Anthony di Prima","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11338"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11338\/revisions"}],"predecessor-version":[{"id":11353,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11338\/revisions\/11353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10345"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}