Cyber threats

Expert Voices

Where current cybersecurity guidelines fall short

Illustration: Aïda Amer/Axios

Amidst legislative stalling, a consortium of twelve manufacturers has developed a framework for automotive cybersecurity best practices.

The big picture: At first glance, their guidelines hit the right points — incorporating security into design, developing risk assessment and incident response strategies — but current security solutions are not sufficient against increasingly sophisticated threats.

Expert Voices

Spree of cyberattacks highlights digital vulnerabilities in the Gulf

computer with colored lines beaming in and out
Illustration: Lazaro Gamio/Axios

An increase in cyberattacks across the Persian Gulf has underscored the region's rising geopolitical tensions and cybersecurity vulnerabilities.

The big picture: Government agencies, critical infrastructure and flagship state-owned firms are the prime targets for these cyberattacks, many of which have been linked to Iran or its proxies. While Iran has long threatened to close the Strait of Hormuz during a military conflict, its asymmetric cyber warfare capabilities have become a key means to destabilize competitors and adversaries.