Connected cars, cloud and cybersecurity

1 November 2019 Information Security

Autonomous, or self-driving cars will make driving safer, smarter and more efficient. Equipped with internet connections and often wireless local area networks, self-driving cars can speak to each other and the environment around them.


Prabashni Naidoo

Autonomous cars will include features such as lane assist, collision avoidance and automatic calls to emergency services to create a safer driving experience. One feature allows the cars to keep their distance and synchronise braking to avoid accidents. Some automotive brands are taking automation a step further, innovating to enable vehicles to communicate with nearby infrastructure and even pedestrians, adding a new dimension to how automation can benefit society.

To develop and deploy autonomous cars at scale, the right technology infrastructure is critical. Production of these vehicles requires high-performance computing capacity, along with seamless cybersecurity and the ability to manage vast data sets. This is why many organisations are taking advantage of the numerous benefits offered by the cloud, including cloud infrastructure’s reliability, scalability and security.

Training and testing

Autonomous cars strive to create vehicles that operate more safely than humans. Delivering on this ambition requires extensive modelling and testing. The ability to collect, store, and manage data is critical, as are advanced machine learning techniques.

Toyota Research Institute (TRI) believes that accurately training autonomous cars requires trillions of miles of testing. To deliver on this, it has a fleet of test cars equipped with Light Direction and Ranging (Lidar) Sensors to record data, collecting terabytes of data every day, needing quick retrieval and analyses.

TRI uses AWS to manage this data and access the processing power required to train machine learning models quickly. Using cloud infrastructure, it has gained the ability to spin up compute and storage resources on demand and blend these with management and orchestration services. TRI now retrains vehicle models, increases accuracy, and introduces new features faster. By following similar models, more automotive businesses will accelerate the development of safer cars.

Edging forward

Enabling autonomous cars to make rapid, data-driven decisions will make our roads safer. These machines need backing by reliable infrastructure with low latency and high availability. They also need to analyse information in real time, including data on road conditions, weather, and the behaviour of other vehicles. Applying AI allows the car to react swiftly and safely to road conditions.

Edge computing allows this core in-car technology to perform its in-car data crunching. When a second of lag can make the difference between a safe or dangerous response, autonomous vehicles do not have the luxury of waiting for data processing in the cloud. Therefore, organisations need to look for cloud providers with integrated edge solutions. These allow analysis of mission-critical data at the source and reducing the cost of transmitting additional data to the cloud.

Security in the cloud

Cybersecurity is important when developing safety-focused autonomous cars. Each vehicle becomes a new endpoint which must be secured. Protection from hackers and malware must be a top priority to ensure they cannot gain access to driving controls or the data that runs through each vehicle.

Autonomous car producers are turning to the cloud in order to support and run connected cars. It’s the job of the cloud provider to ensure cybersecurity updates and upgrades regularly happen. Additionally, the best cloud providers deliver automated security services which apply machine learning to proactively manage tasks including security assessments, threat detection, and policy management. By having security baked in, manufacturers can be confident that they have the solutions in place to detect new and emerging vulnerabilities and threats which will reduce harm to drivers and lower the risk of a breach.

Connected cars, cloud and security

Autonomous cars are our future; however to drive adoption, manufacturers must ensure they are secure and supported by robust infrastructure. Using the right cloud vendors is critical, enabling organisations to focus their resources on building differentiated automotive experiences, rather than managing IT infrastructure.

With this in mind, AWS provides a full suite of services to support autonomous vehicle development and deployment. AWS provides a full suite of services to support Advanced Driver Assistance Systems (ADAS) and Autonomous Vehicle development and deployment. AWS' nearly unlimited storage and compute capacity and support for deep learning frameworks such as Apache MXNet, TensorFlow and PyTorch accelerate algorithm training and testing. AWS Greengrass provides edge computing with machine learning inference capabilities for real-time processing of local rules and events in the vehicle while minimising the cost of transmitting data to the cloud. A combination of scalable storage and compute capacity and support for deep learning frameworks help accelerate testing and service development. At the same time, its agile platform helps businesses accelerate the pace of innovation, improve security posture and lower IT cost structure.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.