SYS-CON MEDIA Authors: Stackify Blog, Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan

News Feed Item

Trillium CEO Embarks On "Hack Across America" Tour



Six-month Campaign Raises Awareness about the Threat of Vehicular Cyber-Attacks

SUNNYVALE, CA, June 5, 2018 - (ACN Newswire) - Trillium President and CEO David Uze is embarking tomorrow on a six-month road trip to publicize the reality of automotive cyber-attacks, commonly known as car hacking, an intrusion often done remotely using a digital device. The threat is real, and it exists today across industry sectors from cell phones to home computers to autonomous and connected vehicles.

Trillium's mission is to provide lifecycle cybersecurity protection for vehicular data, whether for the family on vacation in their car or for the mechanisms in a military vehicle, designed to protect America's interests on the battlefield. Uze and his fellow "cyber warriors" at Trillium are committed to educating the public about their multi-layered solutions that provide real-time protection in all types of vehicles from cars to trucks to military tanks.

Driving a Trillium-branded Tesla, Uze will criss-cross America on several road trips, talking to drivers about their vehicles as "computers on wheels" that need cyber protection; visiting universities to encourage engineering students to join the war against cyber thieves; and talking to university professors about how Trillium can support more research into effectively fighting cyber-hacking. Periodically, Uze plans to stop at American landmarks to push the message out to the American public beyond the occasional news story about ransomware or a huge cyber breach. He wants people to know that it can happen to them.

"If you don't believe a hacker can get into your car remotely using a digital device, you could end up being sadly mistaken," said Uze. "Last month, a sheriff in Michigan had his gun stolen from his car parked in front of his home. The video taken from the home's security cameras clearly shows how it happened. The thief didn't need to touch the vehicle to access the interior." Uze's first stop is Southeast Michigan where he will visit Ann Arbor and Detroit.

"Trillium has a growing customer base in Southeast Michigan," said Uze. "The issue of cybersecurity is recognized by vehicle makers. But we want to broadcast the Trillium message to all drivers that they can be hacked. Without cybersecure software in place, hackers can penetrate a vehicle's systems in seconds through any number of attack vectors. They can open vehicle doors and windows, but even more frightening, they can take over the vehicle's steering, steal personal information from a GPS system or shut the car down altogether. Trillium products will stop them."

Trillium is the global leader in vehicular lifecycle cybersecurity assurance platforms. Uze and his management team see this campaign as a first step in their quest to broaden the cyber-protection conversation. For example, fleets of vehicles are vulnerable to remote hacking as are autonomous vehicles which are currently under development by both public and private companies. Trillium works with these industry sectors and with aerospace and defense companies. The Department of Homeland Security hacked into a Boeing 757 as recently as last year.

Through its "Hack Across America" project, Trillium is doing its part to alert American drivers to hidden cybersecurity risks. For Trillium, the future is now, and speed is crucial to raising the hacking work factor thereby discouraging cyber-criminals.

About Trillium Secure, Inc.
The Trillium vehicular lifecycle cybersecurity assurance platform provides a multi-layered solution for hardening connected and autonomous vehicles against cyber-attack. Trillium's SecureIOT platform provides authenticated operational and threat management data from fleet vehicles that preserves privacy, confidentiality and anonymity of data while at rest and in motion. Value-added service providers rely on secure and authentic data from Trillium for digital forensics, UBI, preventive maintenance, telematics, car sharing and other services. Trillium design centers and fleet security operation sites are located in Silicon Valley, Ann Arbor, Ho Chi Minh City and Tokyo. For more information, please visit www.trilliumsecure.com.

Trillium Secure, Inc. products and services are marketed under the Trillium, SecureGO, SecureIoT, SecureCAR, SecureIXS, SecureOTA and SecureSKYE trademarks.

For Media Enquiries, please contact [email protected].

Source: Trillium Secure, Inc.

Copyright 2018 ACN Newswire . All rights reserved.

More Stories By ACN Newswire

Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
xMatters helps enterprises prevent, manage and resolve IT incidents. xMatters industry-leading Service Availability platform prevents IT issues from becoming big business problems. Large enterprises, small workgroups, and innovative DevOps teams rely on its proactive issue resolution service to maintain operational visibility and control in today's highly-fragmented IT environment. xMatters provides toolchain integrations to hundreds of IT management, security and DevOps tools. xMatters is the ...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at @DevOpsSummit at 19th Cloud Expo, Charles Kendrick, CTO at Isomorphic Software, presented a revolutionary model enabled by new technologies. Learn how business and develop...
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.