News & Events
SecureRF's Security Toolkit for Intel's DE10-Nano
Intel FPGA-SoC devices are well suited for a wide variety of Internet of Things (IoT) applications, including acting as an IoT gateway that can authenticate and control hundreds or thousands of remote endpoints. Developers using Intel’s DE10-Nano kit, which is based on a Cyclone V FPGA, can now implement SecureRF’s DE10-Nano Security Toolkit to protect…
Read MoreIoT Security News – Still Many Ports of Entry for Malefactors
Every device connected to the internet is a potential point of vulnerability. As the following report shows, design engineers and developers must anticipate security threats at every stage between a device’s design and deployment. Remote Peeping into Bedrooms and Offices In June 2017, some residents of Dubai, UAE, discovered to their alarm that footage from…
Read MoreIoT Security News — Issues with Authentication and Open Ports
When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…
Read MoreSecureRF to Showcase Quantum-Resistant IoT Security Solutions at IoT DevCon
IoT product developers interested in speaking with our IoT security experts and learning about quantum-resistant authentication and data protection solutions will have their chance at the IoT DevCon conference being held April 26-27 in Santa Clara, CA. We will be showcasing our ultra-low-energy security solutions for constrained devices at Table 9. These solutions, which are…
Read MoreSecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board
SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…
Read MoreIoT Security News — Detection Improves,But Gaps Remain
While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial action has improved. As evidenced by the IoT-security news items below, IT security staff can spot some types of attacks during or immediately after they occur – but in some cases, even the most stringent…
Read MoreSecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions for low-resource IoT devices. Through this partnership, companies can quickly, effortlessly and economically develop high performance, energy-efficient devices using ASICs that deliver strong security. Security is a necessity for most IoT devices. However, 32-, 16-,…
Read MoreWebinar Replay Available: Rapidly Securing Constrained IoT Devices
Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…
Read MoreWebinar Replay Available: Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…
Read MoreRegister for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read More