Home

Building great solutions for automotive cybersecurity to keep mobility safe.

Based in the heart of the Motor City — Detroit, Michigan — Block Harbor is a managed cybersecurity service provider focused on automakers and suppliers. With deep expertise in cloud, embedded, and automotive systems, we tailor our services and solutions to meet the demands of the rapidly changing connected vehicle and component ecosystem. Every decision on our team is made with passenger safety in mind. 

Our Services       Our Solutions

Differentiators.

Vehicle System Knowledge

Block Harbor gets it. Vehicle cybersecurity requires people that know and understand vehicle systems. Some of our first and largest projects were around cloud-based vehicle diagnostic systems for an automaker, where we focused on cybersecurity end-to-end: the vehicle, the vehicle communication interface, and the cloud infrastructure.


Regulatory Landscape

As the vehicle cybersecurity space has unfolded, Block Harbor’s focus has been on delivering meaningful solutions that solve the real headache: work products for regulations. We get that everyone’s end goal is a secure vehicle, but it needs to be done in a structured and repeatable way to meet standards and regulations. All of our solutions are driven by ISO/SAE 21434 and UNECE WP 29.

Years of Experience 

Block Harbor was founded in 2014, the same year the Jeep Hack jump started the industry. Over the years, we’ve been accumulating experience with different automakers and suppliers in vehicle cybersecurity for this particular purpose: to help our customers into the future of a standardized and regulated landscape. You can be sure that our solutions and guidance are based on a unique base of knowledge that few others in the automotive cybersecurity space offer.

Appropriate Automation 

Vehicle cybersecurity doesn’t work if it is a manual process powered by teams of hundreds. We recognize that delivering a software update or security patch inside of a structured process like ISO/SAE 21434 is intentionally slow. However, attackers and researchers aren’t going to wait for you to check all of your boxes. That’s why we’re relentlessly focused on automating repetitive work in the vehicle cybersecurity engineering process to ensure vehicles are secure and stay secure.

Services.

Service Page Link Here

Vehicle Cybersecurity Labs

  • Penetration Testing
  • Fuzzing
  • V&V-as-a-Service (VaaS)
  • Vehicle Cybersecurity Lab Buildout

Service Page Link Here

Vehicle Security Operations

  • Vehicle Security Operations Center (VSOC)
  • Threat Analysis & Risk Assessment (TARA)
  • Vehicle Cybersecurity Management System (CSMS)
  •  

Service Page Link Here

Vehicle Cybersecurity Consulting

  • ISO/SAE 21434, UNECE WP.29, & More
 
 
 
 

Our Credentials.

Founding Members of ASRG Detroit

Dedicated to advancing the state of automotive cybersecurity globally.

Winners at DefCon 27 Car Hacking Village

You can trust our experience is proven competitively.

Partners with Keysight Technologies to actualize automotive workbench

Our research and expertise fuel automotive security innovation.

View our capability statement.

Articles.

The previous posts outlined how to think about what a security design for ISO/SAE 21434 might look like. ISO/SAE 21434 in it’s current state is vague, we want to be

TARA completed, now what?  Below is an outline of the subsequent steps taken after completing a TARA within the organization. TARA documents will provide crucial information in determining how security

Concept Phase. The Internet of Things, sounds simple enough right?  What about when we integrate embedded devices into the IoT. If not already, in the near future, homes, sidewalks, vehicles,

This year has been a huge success for Block Harbor and we’re proud to be part of pushing our industry forward.  Consumer Electronics Show (CES) Early in the year we

THE BACKGROUND. An automotive supplier, well known for smart systems, reached out to us after they suffered a Ransomware attack (we’ll call them “Tyrel Industries” for purposes of this Case

The purpose of a security operation center (SOC) is to protect an organization from cyber attacks by setting up defenses, monitoring to detect cyber incidents, enforcing security policies, and responding

In the following decade, billions of internet connected devices are coming online. Currently we’re seeing many seep into our households: smart speakers, thermostats, and fridges to name a few. In mobility,

Partnerships.

Interested in becoming a partner? Contact Us!