C2A Security

C2A Security

Computer and Network Security

Jerusalem, Israel 6,414 followers

The only risk-driven DevSecOps provider that addresses the specific needs of automotive and mobility companies.

About us

C2A Security is the only risk-driven DevSecOps provider that addresses the specific needs of car makers and mobility companies.

Website
http://www.c2a-sec.com
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Jerusalem, Israel
Type
Privately Held
Founded
2016
Specialties
Cyber Security, Automotive, Cybersecurity lifecycle management , Embedded security solutions , TARA, and electric vehicles

Products

Locations

Employees at C2A Security

Updates

  • View organization page for C2A Security, graphic

    6,414 followers

    #Munich #EmployeeSpotlight #Team The formal welcome of Ghita to our Munich office is still fresh, yet beyond her role (Solutions and Account Manager) and responsibilities (spearheading customer success activities in Europe), here are four Trivia facts about Ghita (links in the comments): 1️⃣ She's an avid reader. Currently busy with David Whyte's work on the conversational nature of reality. Also on her bookshelf: The Psychology of Money, La civilisation de l´automobile, and Sapiens by Yuval Noah Harari. 2️⃣ Ghita loves swimming and also got into Pilates and Yoga recently. 3️⃣ Ghita earned her B.Sc. in Photonics Engineering, and worked at Airbus Defence and Space and Zodiac Aerospace 🛰️ 4️⃣ Last but not least - she loves to travel ✈️ interact with people and new cultures, and has a spot soft for chocolate 🍫 Join us again in welcoming Ghita Zouiten to our team!

    • No alternative text description for this image
    • Source: Monash University
  • View organization page for C2A Security, graphic

    6,414 followers

    #WeekendVibes #team #Munich Kicking off our monthly #AllHands with the obligatory burgers & fries combo 🍟🙃 📢 While on the topic, join us in welcoming Ghita to the team! 🥳 Based in Munich, Ghita is joining us from Ansys, where she held diverse engineering and sales roles during her 6-year tenure. Ghita will be responsible for customer engagement, implementation, and support, reporting to Stephane, VP of Accounts and Solutions. Welcome Ghita! 🥳 Read more about Ghita on our blog, link in the 1st comment. #Careers #Cybersecurity #ProductSecurity #Munich

    • No alternative text description for this image
  • View organization page for C2A Security, graphic

    6,414 followers

    #Cybersecurity #China #Standards In July we announced our support for the generation of automated audit reports of Chinese GB Standards - and our timing was near perfect ;-) ThunderSoft's Zhe Ouyang: "The publication of GB 44495-2024 and GB 44496-2024 this week marks a significant step forward for China's automotive cybersecurity landscape. As we discussed in our joint webinar last year, these standards demonstrate a strong commitment to ensuring that connected vehicles are secure and up-to-date in an increasingly digital and interconnected automotive environment." ** The GB 44495-2024 Standard ** The GB 44495-2024 sets out clear technical requirements for vehicle cybersecurity, providing a comprehensive framework for manufacturers to address and mitigate cyber threats. This standard ensures car makers adopt robust cybersecurity measures, covering everything from secure communication protocols to protection against unauthorized access and data breaches. Compliance with these standards is critical for car makers looking to operate in the Chinese market. ** The GB 44496-2024 Standard ** The GB 44496-2024 focuses on the technical aspects of software updates, an area crucial for maintaining vehicle safety and functionality. Over-the-air (#OTA) updates allow manufacturers to deploy security patches and feature enhancements without recalling vehicles. This standard ensures that the entire software update process, from development to deployment, adheres to strict cybersecurity protocols, protecting vehicles from potential vulnerabilities introduced by malicious actors. ** Fines and Implications for Non-Compliance ** Non-compliance with the Chinese GB Standards can result in significant consequences for automotive companies. The regulatory authorities in China have the power to impose fines and other penalties to enforce compliance. To learn how EVSec Platform empowers companies to automate their regulatory efforts, read our blog post and schedule an exclusive demo for your team. Links in the comments. #GB44495 #GB44496 #ProductSecurity #Standards #DevSecOps

    • Chinese GB Standards: C2A Security’s EVSec Platform is the 1st to support the generation of automated audit reports
  • View organization page for C2A Security, graphic

    6,414 followers

    #Podcast #BlackHat #ProductSecurity 🎙️Last month during Black Hat , Roy was invited to chat with Ben on a special #BlackHat Edition of the #CyberBytes podcast, alongside industry leaders as Nadir Izrael from Armis and Eyal Fisher from Sweet Security, recorded live in Las Vegas 🎧 Thanks Ben and Aspiron Search for the opportunity to share our story, our unique #DevSecOps platform for #SoftwareDefined products, and how we empower our customers to develop more secure software at scale. 🔗 Links to the full episode in the 1st comment, either YouTube or Spotify. #Cybersecurity #Security #LasVegas #BH24 #Defcon

  • View organization page for C2A Security, graphic

    6,414 followers

    You'll always remember your 1st job... 😊 Kobi, welcome to the team! And thank you for trusting us with this 🙏🥳 Kobi is joining us fresh from his B.Sc. studies in computer science as a #Java Developer. He enjoys traveling, playing #Tennis (we're guessing what you watched last week... US Open 😮🎾), and hiking - wherever 😎🥾 Join us in welcoming Kobi 🥳 #careers #engineering #cybersecurity #productsecurity

    • No alternative text description for this image
  • View organization page for C2A Security, graphic

    6,414 followers

    "The weakest link in the #cybersecurity chain is the human element." - Kevin Mitnick ⛓️💥 🤳 Gotta respect the #hackers that thought about this #Quishing idea. The challenges with this attack is double fold in our opinion: 1. Most mitigation strategies involve the consumers - whether through increased awareness and education on QR scanning, using URL previews, or implementing #MFA. 2. As Denis points out - the attack is easily transferable to the #EVs, which opens up a whole array of challenges ⚡️🔋 What do you think? How would you mitigate such an attack? 🔗 Read Denis Laskov original post👇 https://lnkd.in/djh53j6Q #ProductSecurity #Cybersecurity #QRCode #QRHacking #electricvehicles

    View profile for Denis Laskov, graphic

    Chief Hacker at EY IL | Global Cybersecurity and Technology Leader | Telecom and Automotive

    Quishing for EV chargers - a new way to steal your money or install malware on your mobile phone. ⚡️🚗🦹🏽♂️ The car is not affected, yet 🤞 Quite often on street EV chargers, you may find a URL or QR code to unlock the charger and pay for it. Criminals use specially crafted QR code stickers that they put on top of the legitimate one. And as in classic phishing, victims enter their credit card details or install malicious software. What is interesting here is that this attack can be easily transformed to not only target the victim's phone but also the car itself. *Quishing is like a phishing, but with a QR code. #electric #vehicle #ev #scam #theft #charging #quishing #cyber #security

  • View organization page for C2A Security, graphic

    6,414 followers

    "The hardest thing to see is what's in front of your eyes." https://lnkd.in/djh53j6Q

    View profile for Denis Laskov, graphic

    Chief Hacker at EY IL | Global Cybersecurity and Technology Leader | Telecom and Automotive

    Quishing for EV chargers - a new way to steal your money or install malware on your mobile phone. ⚡️🚗🦹🏽♂️ The car is not affected, yet 🤞 Quite often on street EV chargers, you may find a URL or QR code to unlock the charger and pay for it. Criminals use specially crafted QR code stickers that they put on top of the legitimate one. And as in classic phishing, victims enter their credit card details or install malicious software. What is interesting here is that this attack can be easily transformed to not only target the victim's phone but also the car itself. *Quishing is like a phishing, but with a QR code. #electric #vehicle #ev #scam #theft #charging #quishing #cyber #security

  • View organization page for C2A Security, graphic

    6,414 followers

    #Careers #Engineering We're Hiring an R&D Director! Are you a visionary leader with a passion for innovation in cybersecurity? We seek an experienced and highly skilled hands-on R&D Director to join our dynamic and innovative software development team. As a crucial team member, you will be responsible for designing, developing, and architecting our products. You will be actively coding and doing design reviews. A pivotal role in shaping the technical direction of our projects and driving engineering excellence across the organization. 🔗 Ready to take the next step in your career? Check the full description on our website and apply today: https://lnkd.in/dFc2rini #Hiring #ProductSecurity #DevSecOps

    • No alternative text description for this image
  • View organization page for C2A Security, graphic

    6,414 followers

    🎚️ So, what's your #Cybersecurity Maturity Indicator Level?🤷♂️ And why 'leveling up' is crucial for your organization's resiliency? 🤔 Read our latest blog post to learn (almost) everything about the Cybersecurity Capability Maturity Model (#C2M2), its five levels, its importance, why leveling up is imperative, and more (link in the 1st comment). 👇👇👇 The #NIST Cybersecurity Framework (CSF) is a widely used cybersecurity guideline, developed to help organizations understand, manage, and reduce cybersecurity risks. While the Maturity Model and NIST #CSF both serve to guide cybersecurity efforts, they are complementary rather than redundant. The Cybersecurity Capability Maturity Model (#C2M2) was developed in 2012 by the U.S. Department of Energy (DOE) and National Institute of Standards and Technology (NIST) to help organizations in critical infrastructure industries assess and improve their cybersecurity capabilities. Over time, it has become widely adopted across various industries due to its structured, scalable approach - including #automotive, #mobility, #financial and #pharma. 👆👆👆 More on our blog.

    • No alternative text description for this image
  • View organization page for C2A Security, graphic

    6,414 followers

    #LaborDay 🎉 Wishing a Happy Labor Day to our US and Canadian colleagues! 🎉 As we take a moment to celebrate the hard work and contributions of workers across industries, it’s also a great time to reflect on your career journey 🙃 Whether you're considering a new opportunity or looking for a fresh start, this could be the perfect moment to explore what’s out there. We have multiple open positions across Sales, R&D, and Marketing - now might be the time to make that career change you've been thinking about! 🚀 🔗: https://lnkd.in/eNYpPz9m

    • No alternative text description for this image

Similar pages

Funding

C2A Security 4 total rounds

Last Round

Series A

US$ 7.7M

See more info on crunchbase