Our Platform

    Protect and safeguard your OT network and operations with the industry's most advanced, most capable cybersecurity platform.

    Learn More

      icon for visibility

      Asset and Network Visibility

      Discover and visualize every asset and every network connection in your OT environment.

      icon for policy enforcement

      Policy Enforcement

      Segment your network and enforce granular policies for true Zero Trust cybersecurity.

        icon-alert

        Anomaly and Threat Detection

        Identify unexpected or unauthorized activity, from Level 0 signals to cloud connections.

        icon for signal integrity

        Signal Integrity Validation

        Monitor physical process signals to detect threats and prevent system damage.

          Mission Secure Platform Overview

          Learn More

            Industries

            Keep your organization secure against cyber threats and take control of your OT network.

            View All Industries

              A Comprehensive Guide to Maritime Cybersecurity

              Learn More

                Resources

                Find helpful OT and ICS cybersecurity resources, guides, and downloads.

                View All Resources

                  eBook: A Comprehensive Guide to OT Cybersecurity

                  Read More

                    About Us

                    Our team of world-class OT, IT, and cybersecurity experts are setting the standard in OT cyber-protection.

                    Learn More

                      Cyber Risk: From a Hacker's Point of View

                      Listen Now
                        1 Min Read

                        San Francisco Examiner | Dolan: Vehicles vulnerable to remote manipulation

                        Written by Mission Secure News Desk

                        August 13, 2015


                        In response to a question regarding the ability for today's modern cars to be hacked and taken over, the San Francisco Examiner reviews current news, trends, and protections available, including Mission Secure's innovative approach to securing vehicles.

                        Q: “I have been reading about the vulnerability of today’s modern cars. Is it true that they can be hacked and taken over? If they are taken over and a crash happens, who is responsible?”

                        ...

                        On July 21, an experiment was conducted by a team of systems vulnerability and security analysts from a company called IOActive, which, over the last five years through a series of Department of Defense grants, has conducted research on the ability to gain remote control over a vehicle’s computerized control systems.

                        While a new Jeep Cherokee was driven by Andy Dreenberg, an author for Wired Magazine, at 70 mph on a highway though St. Louis, Charlie Miller and Chris Valasek from IOActive began turning on and off the air conditioner, manipulating the radio and the windshield wipers. All of this was done without them altering any of the vehicle’s hardware or having any hardware link installed on the car.

                        Miller and Valasek then upped the ante and completely disengaged the transmission causing a complete power failure. Dreenberg lost all ability to control the vehicle’s speed on a highway as an 18-wheeler came fast upon it. If that were not enough, Miller and Valasek made their likenesses appear on the vehicles navigation and control screen. Miller and Valasek were 10 miles away when they assumed all control.

                        This experiment is not isolated. Mission Secure Inc., a cyber-defense solutions provider, and Perrone Robotics Inc., a software developer for autonomous vehicles, working with the University of Virginia and the Department of Defense, also took over control of a vehicle. Then they demonstrated a prototype of a security system, called “Secure Sentinel,” which can sense a security threat to vehicles automated systems and engage a counter measure “faster than a human could.”

                        Check out the full article on the San Francisco Examiner!

                        Read More

                        Interested in learning more? Send us a message.