{"id":58753,"date":"2023-05-23T08:44:05","date_gmt":"2023-05-23T08:44:05","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=58753"},"modified":"2024-11-07T06:10:05","modified_gmt":"2024-11-07T06:10:05","slug":"automotive-cybersecurity","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","title":{"rendered":"Securing the automotive ecosystem #Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58753\" class=\"elementor elementor-58753\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-251222a6 elementor-section-full_width gg-banner-with-slider gg-slider-animation-ltr gg-slider-animation-ltr--active elementor-section-height-default elementor-section-height-default\" data-id=\"251222a6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60c6e0fd\" data-id=\"60c6e0fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24ba07ac content-align---mobileleft content-align--left elementor-widget elementor-widget-gravity-slider\" data-id=\"24ba07ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gravity-slider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n        <div class=\"container gg-slider\" data-settings='{\"sliderAutoplay\":false,\"sliderAutoplaySpeed\":5000,\"animationSpeed\":500}'>\r\n            <div class=\"swiper-container\">\r\n                <div class=\"swiper-wrapper\">\r\n                                                                    <div class=\"swiper-slide elementor-repeater-item-657f3c1\"  >\r\n                            <div class=\"bg-image elementor-background-video-container slide-0\">\r\n                                                            <\/div>\r\n                            <div class=\"slider-inner \">\r\n                                        <div class=\"gg-slider-subheading gg-tagline-heading-left\">\r\n            <h2><span style=>Cybersecurity<\/span><\/h2            >\r\n        <\/div>\r\n                <div class=\"gg-slider-title elementor-repeater-item-657f3c1 \">\r\n            <h3><span class=\"slider-item-heading\">Securing your automotive systems <\/span><span class=\"slider-item-sub-heading\"><\/span><\/h3            >\r\n        <\/div>\r\n                <div class=\"gg-slider-description elementor-repeater-item-657f3c1 \">\r\n            <span class=\"slider-item-description\"><p>We specify, test and secure systems and functions that are used in interconnected vehicles and infrastructures, because preserving cybersecurity is essential.<\/p><\/span>        <\/div>\r\n                                        <div class=\"scroll elementor-element  scroll--hidden\">\r\n                                    <span><\/span>\r\n                                <\/div>\r\n                                <div class=\"\"><\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                                                 <div class=\"swiper-slide elementor-repeater-item-ebde552\"  >\r\n                            <div class=\"bg-image elementor-background-video-container slide-1\">\r\n                                                            <\/div>\r\n                            <div class=\"slider-inner \">\r\n                                        <div class=\"gg-slider-subheading gg-tagline-heading-left\">\r\n            <h2><span style=>Cybersecurity<\/span><\/h2            >\r\n        <\/div>\r\n                <div class=\"gg-slider-title elementor-repeater-item-ebde552 \">\r\n            <h3><span class=\"slider-item-heading\">A Global Network <\/span><span class=\"slider-item-sub-heading\"><\/span><\/h3            >\r\n        <\/div>\r\n                <div class=\"gg-slider-description elementor-repeater-item-ebde552 \">\r\n            <span class=\"slider-item-description\"><p>Expleo has built a strong global network f cyber experts. Taskforces in six countries make security-related developments more efficient in the digital world.<\/p><\/span>        <\/div>\r\n                                        <div class=\"scroll elementor-element  scroll--hidden\">\r\n                                    <span><\/span>\r\n                                <\/div>\r\n                                <div class=\"\"><\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                                                 <div class=\"swiper-slide elementor-repeater-item-5bbc47e\"  >\r\n                            <div class=\"bg-image elementor-background-video-container slide-2\">\r\n                                                            <\/div>\r\n                            <div class=\"slider-inner \">\r\n                                        <div class=\"gg-slider-subheading gg-tagline-heading-left\">\r\n            <h2><span style=>Cybersecurity<\/span><\/h2            >\r\n        <\/div>\r\n                <div class=\"gg-slider-title elementor-repeater-item-5bbc47e \">\r\n            <h3><span class=\"slider-item-heading\">End-to-End-Security <\/span><span class=\"slider-item-sub-heading\"><\/span><\/h3            >\r\n        <\/div>\r\n                <div class=\"gg-slider-description elementor-repeater-item-5bbc47e \">\r\n            <span class=\"slider-item-description\"><p>A holistic approach to safety &amp; cybersecurity is key to mitigating cyber-risks. Regardless of whether it\u2019s Car2X, services for Backend IT or autonomous driving.\u00a0<\/p><\/span>        <\/div>\r\n                                        <div class=\"scroll elementor-element  scroll--hidden\">\r\n                                    <span><\/span>\r\n                                <\/div>\r\n                                <div class=\"\"><\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                                 <\/div>\r\n\r\n                <!-- If we need pagination -->\r\n                <div class=\"swiper-pagination\"><\/div>\r\n\r\n                <!-- If we need navigation buttons -->\r\n                <div class=\"swiper-arrow swiper-button-prev\"><\/div>\r\n                <div class=\"swiper-arrow swiper-button-next\"><\/div>\r\n            <\/div>\r\n        <\/div>\r\n\r\n\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da18c9e gg-container-large-pt-72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da18c9e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6efeac7\" data-id=\"6efeac7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e871cc elementor-widget elementor-widget-heading\" data-id=\"4e871cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Securing the Automotive Ecosystem <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8859f16 elementor-widget elementor-widget-spacer\" data-id=\"8859f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e70f17 elementor-widget elementor-widget-text-editor\" data-id=\"8e70f17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"fontstyle0\">Modern vehicles are complex systems that rely on a multitude of interconnected components, applications and Backend IT services. Therefore <\/span><span class=\"fontstyle0\">a systematic and holistic approach is essential to mitigating risks on different technical layers.<\/span><\/p><p><span class=\"TextRun SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130815876 BCX0\">Highly skilled<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> teams propose <\/span><\/span><a class=\"Hyperlink SCXW130815876 BCX0\" href=\"https:\/\/expleo.com\/global\/en\/services\/product-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">end-to-end services<\/span><\/span><\/a><span class=\"TextRun SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130815876 BCX0\"> to ensure the maximum de<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">gree of safety and security of <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">vehicles and <\/span><\/span><a class=\"Hyperlink SCXW130815876 BCX0\" href=\"https:\/\/expleo.com\/global\/en\/services\/digital-transformation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">digital <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">systems<\/span><\/span><\/a><span class=\"TextRun SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130815876 BCX0\">. We <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW130815876 BCX0\">analyse<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> security-relevant systems, develop security concepts<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">,<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> and ensure that products are compliant <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">wi<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">th<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> new security regulations. Backed <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">by a strong network of <\/span><\/span><a class=\"Hyperlink SCXW130815876 BCX0\" href=\"https:\/\/expleo.com\/global\/en\/industries\/automotive\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">&gt; 5<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">,<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">000 <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\" data-ccp-charstyle=\"Hyperlink\">automotive experts<\/span><\/span><\/a><span class=\"TextRun SCXW130815876 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130815876 BCX0\"> and a global footprint with cross-<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">country <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW130815876 BCX0\">taskforces<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> we can <\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">assist<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\"> you in making your products more resilient against <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW130815876 BCX0\">cyber-threats<\/span><span class=\"NormalTextRun SCXW130815876 BCX0\">.<\/span><\/span><span class=\"EOP SCXW130815876 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ad49b elementor-widget elementor-widget-spacer\" data-id=\"17ad49b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87bd6aa elementor-widget elementor-widget-image\" data-id=\"87bd6aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-inpage.jpg\" class=\"attachment-full size-full wp-image-60329\" alt=\"An illustration of a car surrounded by multicolored lines, representing different layers of cybersecurity: &quot;Automotive Cybersecurity,&quot; &quot;IT Cybersecurity,&quot; &quot;Cloud &amp; Systems Cybersecurity,&quot; and &quot;Functional Safety.&quot; Text highlights secure technology across various sectors.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-inpage.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-inpage-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-inpage-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-inpage-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa056a elementor-widget elementor-widget-spacer\" data-id=\"8aa056a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6225584 gg-white-text-marker gg-container-large-pt-72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6225584\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3840232\" data-id=\"3840232\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbce629 elementor-widget elementor-widget-heading\" data-id=\"dbce629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">More Cybersecurity background needed?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd56b9 elementor-widget elementor-widget-spacer\" data-id=\"2bd56b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c91aeec elementor-widget elementor-widget-text-editor\" data-id=\"c91aeec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4337b32 elementor-widget elementor-widget-heading\" data-id=\"4337b32\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><span style=\"color: #ffffff;\"><strong><span class=\"TextRun SCXW67083782 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW67083782 BCX0\">Based on the <\/span><span class=\"NormalTextRun SCXW67083782 BCX0\">expertise<\/span><span class=\"NormalTextRun SCXW67083782 BCX0\"> of our <\/span><\/span><a class=\"Hyperlink SCXW67083782 BCX0\" style=\"color: #ffffff;\" href=\"https:\/\/expleo.com\/global\/en\/services\/product-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW67083782 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW67083782 BCX0\" data-ccp-charstyle=\"Hyperlink\">security engineering teams<\/span><\/span><\/a><span class=\"TextRun SCXW67083782 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW67083782 BCX0\">, this<\/span><span class=\"NormalTextRun SCXW67083782 BCX0\"> guidebook <\/span><span class=\"NormalTextRun SCXW67083782 BCX0\">provides<\/span> <span class=\"NormalTextRun SCXW67083782 BCX0\">best practices<\/span><span class=\"NormalTextRun SCXW67083782 BCX0\"> to manage cyber<\/span><span class=\"NormalTextRun SCXW67083782 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW67083782 BCX0\">threats in the automotive industry.<\/span><\/span><span class=\"EOP SCXW67083782 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/strong><\/span><\/div>\n<div data-id=\"4337b32\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><\/div>\n<div class=\"elementor-element elementor-element-fb8de98 elementor-widget elementor-widget-text-editor\" data-id=\"fb8de98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<ul>\n \t<li><span style=\"color: #ffffff;\">The main cyber-threats in the automotive sector\u00a0<\/span><\/li>\n \t<li><span style=\"color: #ffffff;\" data-contrast=\"auto\">Cybersecurity compliance and regulation for the automotive industry<\/span><\/li>\n \t<li><span style=\"color: #ffffff;\" data-contrast=\"auto\">Critical success factors for the automotive industry\u2019s leaders<\/span><\/li>\n \t<li><span style=\"color: #ffffff;\" data-contrast=\"auto\">Security action plan for implementing cybersecurity<\/span><\/li>\n<\/ul>\n<span style=\"color: #ffffff;\">Discover how to manage cyber-threats systematically across your automotive project lifecycles.<\/span>\n\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5dc2d6 elementor-widget elementor-widget-spacer\" data-id=\"c5dc2d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1324a60 gg-button-v2 elementor-widget elementor-widget-button\" data-id=\"1324a60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/automotive-cybersecurity-guidebook\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read the Guidebook now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26a1498 elementor-widget elementor-widget-spacer\" data-id=\"26a1498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef03079 elementor-widget elementor-widget-image\" data-id=\"ef03079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"387\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple-1024x495.jpg\" class=\"attachment-large size-large wp-image-60365\" alt=\"A booklet on a purple background titled &quot;Automotive Cybersecurity: The Essential Guide for Executives and Engineers&quot; by Expleo. The cover features a futuristic car graphic and a shield icon. The open pages display colorful infographics and text content on cybersecurity topics.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple-1024x495.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple-300x145.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple-768x372.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple-1536x743.jpg 1536w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/cybersecurity-automotive-whitepaper-mockup-purple.jpg 1600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f64bcf gg-container-large-pt-72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f64bcf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b20e87a\" data-id=\"b20e87a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0eb5d4 elementor-widget elementor-widget-heading\" data-id=\"a0eb5d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity: More insights in automotive and cybersecurity  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ff81d0 gg-slider-post-grid gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ff81d0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8167d84\" data-id=\"8167d84\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-805dbca elementor-widget elementor-widget-jet-listing-grid\" data-id=\"805dbca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"jet-listing-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing-grid jet-listing\"><div class=\"jet-listing-grid__slider\" data-slider_options=\"{&quot;autoplaySpeed&quot;:2000,&quot;autoplay&quot;:true,&quot;pauseOnHover&quot;:true,&quot;infinite&quot;:true,&quot;centerMode&quot;:true,&quot;speed&quot;:500,&quot;arrows&quot;:true,&quot;dots&quot;:false,&quot;slidesToScroll&quot;:1,&quot;prevArrow&quot;:&quot;\\u003Cdiv class=\\u0027jet-listing-grid__slider-icon prev-arrow \\u0027 role=\\u0027button\\u0027 aria-label=\\u0027Previous\\u0027\\u003E\\u003Csvg width=\\u0027180\\u0027 height=\\u0027180\\u0027 viewBox=\\u00270 0 180 180\\u0027 fill=\\u0027none\\u0027 xmlns=\\u0027http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\u0027\\u003E\\u003Cpath d=\\u0027M164 83.5918V96.4082C164 99.9461 162.911 102.967 160.732 105.47C158.554 107.973 155.722 109.225 152.236 109.225H81.4538L110.913 138.662C113.46 141.065 114.734 144.069 114.734 147.674C114.734 151.279 113.46 154.282 110.913 156.685L103.372 164.295C100.892 166.765 97.8759 168 94.3234 168C90.8379 168 87.788 166.765 85.1739 164.295L19.7201 99.0116C17.24 96.5417 16 93.5379 16 90C16 86.5289 17.24 83.4917 19.7201 80.8883L85.1739 15.8049C87.721 13.2683 90.7708 12 94.3234 12C97.8089 12 100.825 13.2683 103.372 15.8049L110.913 23.2144C113.46 25.751 114.734 28.7882 114.734 32.3261C114.734 35.8639 113.46 38.9012 110.913 41.4377L81.4538 70.7754H152.236C155.722 70.7754 158.554 72.027 160.732 74.5302C162.911 77.0334 164 80.0539 164 83.5918Z\\u0027 fill=\\u0027black\\u0027\\\/\\u003E\\u003C\\\/svg\\u003E\\u003C\\\/div\\u003E&quot;,&quot;nextArrow&quot;:&quot;\\u003Cdiv class=\\u0027jet-listing-grid__slider-icon next-arrow \\u0027 role=\\u0027button\\u0027 aria-label=\\u0027Next\\u0027\\u003E\\u003Csvg width=\\u0027180\\u0027 height=\\u0027180\\u0027 viewBox=\\u00270 0 180 180\\u0027 fill=\\u0027none\\u0027 xmlns=\\u0027http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\u0027\\u003E\\u003Cpath d=\\u0027M164 83.5918V96.4082C164 99.9461 162.911 102.967 160.732 105.47C158.554 107.973 155.722 109.225 152.236 109.225H81.4538L110.913 138.662C113.46 141.065 114.734 144.069 114.734 147.674C114.734 151.279 113.46 154.282 110.913 156.685L103.372 164.295C100.892 166.765 97.8759 168 94.3234 168C90.8379 168 87.788 166.765 85.1739 164.295L19.7201 99.0116C17.24 96.5417 16 93.5379 16 90C16 86.5289 17.24 83.4917 19.7201 80.8883L85.1739 15.8049C87.721 13.2683 90.7708 12 94.3234 12C97.8089 12 100.825 13.2683 103.372 15.8049L110.913 23.2144C113.46 25.751 114.734 28.7882 114.734 32.3261C114.734 35.8639 113.46 38.9012 110.913 41.4377L81.4538 70.7754H152.236C155.722 70.7754 158.554 72.027 160.732 74.5302C162.911 77.0334 164 80.0539 164 83.5918Z\\u0027 fill=\\u0027black\\u0027\\\/\\u003E\\u003C\\\/svg\\u003E\\u003C\\\/div\\u003E&quot;,&quot;rtl&quot;:false,&quot;itemsCount&quot;:9,&quot;fade&quot;:false,&quot;slidesToShow&quot;:{&quot;desktop&quot;:3,&quot;tablet&quot;:3,&quot;mobile&quot;:1}}\" dir=\"ltr\"><div class=\"jet-listing-grid__items grid-col-desk-3 grid-col-tablet-3 grid-col-mobile-1 jet-listing-grid--418\" data-queried-id=\"6158|WP_Post\" data-nav=\"{&quot;enabled&quot;:false,&quot;type&quot;:null,&quot;more_el&quot;:null,&quot;query&quot;:[],&quot;widget_settings&quot;:{&quot;lisitng_id&quot;:418,&quot;posts_num&quot;:20,&quot;columns&quot;:3,&quot;columns_tablet&quot;:3,&quot;columns_mobile&quot;:1,&quot;column_min_width&quot;:240,&quot;column_min_width_tablet&quot;:240,&quot;column_min_width_mobile&quot;:240,&quot;inline_columns_css&quot;:false,&quot;is_archive_template&quot;:&quot;&quot;,&quot;post_status&quot;:[&quot;publish&quot;,&quot;draft&quot;],&quot;use_random_posts_num&quot;:&quot;&quot;,&quot;max_posts_num&quot;:9,&quot;not_found_message&quot;:&quot;No data was found&quot;,&quot;is_masonry&quot;:false,&quot;equal_columns_height&quot;:&quot;&quot;,&quot;use_load_more&quot;:&quot;&quot;,&quot;load_more_id&quot;:&quot;&quot;,&quot;load_more_type&quot;:&quot;click&quot;,&quot;load_more_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;use_custom_post_types&quot;:&quot;yes&quot;,&quot;custom_post_types&quot;:[&quot;insights&quot;,&quot;case-studies&quot;],&quot;hide_widget_if&quot;:&quot;&quot;,&quot;carousel_enabled&quot;:&quot;yes&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;arrows&quot;:&quot;true&quot;,&quot;arrow_icon&quot;:&quot;fa fa-arrow-left&quot;,&quot;dots&quot;:&quot;&quot;,&quot;autoplay&quot;:&quot;true&quot;,&quot;pause_on_hover&quot;:&quot;true&quot;,&quot;autoplay_speed&quot;:&quot;2000&quot;,&quot;infinite&quot;:&quot;true&quot;,&quot;center_mode&quot;:&quot;true&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500,&quot;inject_alternative_items&quot;:&quot;&quot;,&quot;injection_items&quot;:[],&quot;scroll_slider_enabled&quot;:&quot;&quot;,&quot;scroll_slider_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;custom_query&quot;:false,&quot;custom_query_id&quot;:&quot;&quot;,&quot;_element_id&quot;:&quot;&quot;,&quot;collapse_first_last_gap&quot;:false,&quot;list_tag_selection&quot;:&quot;&quot;,&quot;list_items_wrapper_tag&quot;:&quot;div&quot;,&quot;list_item_tag&quot;:&quot;div&quot;,&quot;empty_items_wrapper_tag&quot;:&quot;div&quot;}}\" data-page=\"1\" data-pages=\"1\" data-listing-source=\"posts\" data-listing-id=\"418\" data-query-id=\"\"><div class=\"jet-listing-grid__item jet-listing-dynamic-post-58505\" data-post-id=\"58505\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/software-defined-vehicles-success\/\">Four success factors for software-defined vehicle initiatives<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/software-defined-vehicle-inpage-1.jpg\" class=\"attachment-full size-full wp-image-59355\" alt=\"A sleek, futuristic car with wireframe overlay is shown against a blue background. Surrounding the car are various icons representing technology and connectivity, including signals, a power plug, a touch interface, and a circuit board.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/software-defined-vehicle-inpage-1.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/software-defined-vehicle-inpage-1-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/software-defined-vehicle-inpage-1-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/software-defined-vehicle-inpage-1-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Mobility<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Data science &amp; cybersecurity<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Digital transformation<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Innovation and R&amp;D<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tFour success factors for software-defined vehicle initiatives\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-56193\" data-post-id=\"56193\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/automotive-cybersecurity-guidebook\/\">Automotive Cybersecurity: The essential guide for executives and engineers<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/cybersecurity-automotive-guide-featured.jpg\" class=\"attachment-full size-full wp-image-59576\" alt=\"automotive cybersecurity\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/cybersecurity-automotive-guide-featured.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/cybersecurity-automotive-guide-featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/cybersecurity-automotive-guide-featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2023\/04\/cybersecurity-automotive-guide-featured-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Digital transformation<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Mobility<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tAutomotive Cybersecurity: The essential guide for executives and engineers\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-44738\" data-post-id=\"44738\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/master-your-products-cybersecurity-compliance\/\">Master your product\u2019s Cybersecurity compliance with our guide\u00a0<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/11\/cybersecurity-guide_featured.jpg\" class=\"attachment-full size-full wp-image-108865\" alt=\"A woman in a suit holds a smartphone at night, looking up thoughtfully. Behind her are glowing icons of an airplane, a train, and a car, symbolizing different travel options.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/11\/cybersecurity-guide_featured.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/11\/cybersecurity-guide_featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/11\/cybersecurity-guide_featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/11\/cybersecurity-guide_featured-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tMaster your product\u2019s Cybersecurity compliance with our guide\u00a0\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-45176\" data-post-id=\"45176\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/expleosmeeta-hacking-briefcase-automotive-cybersecurity\/\">Expleo develops hacking briefcase for automotive cybersecurity<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/10\/smeeta_thumbnail.jpg\" class=\"attachment-full size-full wp-image-51100\" alt=\"Two people are sitting and interacting at a small, enclosed workspace with blue arches. One is wearing a lab coat. In the background, a person sits typing on their laptop while another walks past. The workspace has soft lighting and modern design elements.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/10\/smeeta_thumbnail.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/10\/smeeta_thumbnail-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/10\/smeeta_thumbnail-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/10\/smeeta_thumbnail-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Innovation and R&amp;D<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tExpleo develops hacking briefcase for automotive cybersecurity\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-33060\" data-post-id=\"33060\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/safe-secure-services-automotive-risk-mitigation\/\">Cybersecurity in automotive \u2013 our end-to-end services to ensure safety and security on and offboard\u200b<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured.jpg\" class=\"attachment-full size-full wp-image-108860\" alt=\"A person\u2019s hand is using a laptop with digital security graphics overlaid, including a shield with a keyhole symbol, representing cybersecurity and data protection.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/05\/cybersecurity_featured-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Digital transformation<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity in automotive \u2013 our end-to-end services to ensure safety and security on and offboard\u200b\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-26891\" data-post-id=\"26891\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/case-studies\/cybersecurity-management-system-csms-establishment-support\/\">Cybersecurity Management System (CSMS) Establishment Support<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-featured.jpg\" class=\"attachment-full size-full wp-image-32129\" alt=\"cyber security\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-featured.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-featured-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tCybersecurity Management System (CSMS) Establishment Support\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-18912\" data-post-id=\"18912\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/ransomware-9-ways-to-protect-your-organisation\/\">Ransomware: 9 Ways to Protect your Organisation<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-02-inpage-min.jpg\" class=\"attachment-full size-full wp-image-29073\" alt=\"Hand reaching to the icons on the board\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-02-inpage-min.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-02-inpage-min-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-02-inpage-min-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/12\/cyber-security-02-inpage-min-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tRansomware: 9 Ways to Protect your Organisation\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-1263\" data-post-id=\"1263\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/asg-series-the-urgent-need-to-shift-left-security-testing\/\">ASG Series: The urgent need to shift-left security testing<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg\" class=\"attachment-full size-full wp-image-1271\" alt=\"Hand reaching to the icons on the board\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Data science &amp; cybersecurity<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Quality assurance &amp; software development<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tASG Series: The urgent need to shift-left security testing\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><div class=\"jet-listing-grid__item jet-listing-dynamic-post-956\" data-post-id=\"956\"  >\t\t<div data-elementor-type=\"jet-listing-items\" data-elementor-id=\"418\" class=\"elementor elementor-418\" data-elementor-post-type=\"jet-engine\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-89b9cd3 gg-post-item-listing-item elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"89b9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b8f21\" data-id=\"41b8f21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a2e58a gg-listing-item-clickable elementor-widget elementor-widget-heading\" data-id=\"9a2e58a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/expleo-and-tehtris-join-forces-to-detect-and-stop-cyber-attacks\/\">Expleo and TEHTRIS join forces to detect and stop cyber attacks<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3a2c4 gg-post-item-listing-item_image elementor-widget elementor-widget-image\" data-id=\"fb3a2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg\" class=\"attachment-full size-full wp-image-1271\" alt=\"Hand reaching to the icons on the board\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage.jpg 1280w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2021\/10\/cyber-security-02-inpage-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6207d2 gg-post-item-listing-item_category elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"f6207d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"yes\">Artificial intelligence &amp; robotics<\/span><\/span><span class=\"jet-listing-dynamic-terms__link\"><span data-primary-term=\"no\">Data science &amp; cybersecurity<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3391d8 gg-post-item-listing-item_cta-widget elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"e3391d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tExpleo and TEHTRIS join forces to detect and stop cyber attacks\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ad2d900 gg-download-form gg-download-form-v2 gg-expleo-form gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ad2d900\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-48b9f47d gg-download-form__description\" data-id=\"48b9f47d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e80015f elementor-widget elementor-widget-gravity-advanced-cta\" data-id=\"2e80015f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gravity-advanced-cta.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gg-advanced-cta\">\r\n            \r\n        <span class=\"gg-advanced-cta__heading gg-tagline-heading-left\">\r\n                Get in touch                <\/span>\r\n                <\/div>\r\n\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf23990 elementor-widget elementor-widget-heading\" data-id=\"bf23990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discover our security services for your project<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34015449 elementor-widget elementor-widget-text-editor\" data-id=\"34015449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Please fill in the form and we will get in touch with you shortly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1c37ce7b gg-download-form__form\" data-id=\"1c37ce7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54c3010 elementor-widget elementor-widget-embed-pardot-form\" data-id=\"54c3010\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embed-pardot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gg-embed-pardot-form\">\n            <iframe src=\"https:\/\/go.expleo.com\/l\/997821\/2023-05-18\/fsjf\" style=\"width: 100%; border: none;\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" class=\"g-analytics-pardot-form\"><\/iframe>        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Connected vehicles require reliable protection against cyber-threats. Expleo\u2019s expertise can increase the product security of your automotive systems. <\/p>\n","protected":false},"author":101,"featured_media":60330,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_angie_page":false,"footnotes":""},"topic":[212],"insights-single-templates":[279],"industry-taxonomy":[33],"content-type":[156],"country":[141],"service":[],"class_list":["post-58753","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-data-science-and-cybersecurity","insights-single-templates-campaign-article","industry-taxonomy-automotive","content-type-campaigns","country-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing the Automotive Ecosystem<\/title>\n<meta name=\"description\" content=\"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the automotive ecosystem #Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T06:10:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/\",\"name\":\"Securing the Automotive Ecosystem\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/automotive-cybersecurity-featured.jpg\",\"datePublished\":\"2023-05-23T08:44:05+00:00\",\"dateModified\":\"2024-11-07T06:10:05+00:00\",\"description\":\"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/automotive-cybersecurity-featured.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/automotive-cybersecurity-featured.jpg\",\"width\":1280,\"height\":720,\"caption\":\"automotive cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/campaigns\\\/automotive-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing the automotive ecosystem #Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing the Automotive Ecosystem","description":"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Securing the automotive ecosystem #Cybersecurity","og_description":"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.","og_url":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","og_site_name":"Global EN","article_modified_time":"2024-11-07T06:10:05+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","url":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","name":"Securing the Automotive Ecosystem","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-featured.jpg","datePublished":"2023-05-23T08:44:05+00:00","dateModified":"2024-11-07T06:10:05+00:00","description":"Connected vehicles require protection against cyber attacks. Expleo is expert to increase the product security of your automotive systems.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-featured.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2022\/09\/automotive-cybersecurity-featured.jpg","width":1280,"height":720,"caption":"automotive cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"Securing the automotive ecosystem #Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/fr\/insights\/campagne\/automobile-cybersecurite\/\" hreflang=\"fr\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/insights\/kampagnen\/automotive-cybersecurity\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":58753,"url":"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/automotive-cybersecurity\/","language":"en","default":true},{"blogId":5,"blogIsHidden":false,"postId":33853,"url":"https:\/\/expleo.com\/global\/fr\/insights\/campagne\/automobile-cybersecurite\/","language":"fr","default":false},{"blogId":6,"blogIsHidden":false,"postId":27710,"url":"https:\/\/expleo.com\/global\/de\/insights\/kampagnen\/automotive-cybersecurity\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/58753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/101"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/58753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/60330"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=58753"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=58753"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=58753"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=58753"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=58753"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=58753"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=58753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}