Posts Tagged ‘IoT security’
SecureRF's Security Toolkit for Intel's DE10-Nano
Intel FPGA-SoC devices are well suited for a wide variety of Internet of Things (IoT) applications, including acting as an IoT gateway that can authenticate and control hundreds or thousands of remote endpoints. Developers using Intel’s DE10-Nano kit, which is based on a Cyclone V FPGA, can now implement SecureRF’s DE10-Nano Security Toolkit to protect…
Read MoreIoT Security News – Still Many Ports of Entry for Malefactors
Every device connected to the internet is a potential point of vulnerability. As the following report shows, design engineers and developers must anticipate security threats at every stage between a device’s design and deployment. Remote Peeping into Bedrooms and Offices In June 2017, some residents of Dubai, UAE, discovered to their alarm that footage from…
Read MoreMaking the Business Case for IoT Security
If you’re an engineer working on products made for the Internet of Things (IoT), you understand the importance of device security, authentication, and data protection. You also know many P&L-fixated executives don’t see an immediate value in funding enhanced IoT product security. Even some of the most technically inclined business leaders have a hard time…
Read MoreIoT in the Movies
The Internet of Things (IoT) has been appearing in movies for several years now—in some cases, even before there was an IoT. Sometimes, the technology depicted is fanciful, but at other times, Hollywood weaves into its narratives technologies that already exist or are looming just over the horizon. Below, we look at the IoT technologies…
Read MoreIoT Security News — Issues with Authentication and Open Ports
When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…
Read MoreImminent Arrival of Quantum Computers Spells Danger for Private Data
In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…
Read MoreThe Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…
Read MoreSecureRF to Showcase Quantum-Resistant IoT Security Solutions at IoT DevCon
IoT product developers interested in speaking with our IoT security experts and learning about quantum-resistant authentication and data protection solutions will have their chance at the IoT DevCon conference being held April 26-27 in Santa Clara, CA. We will be showcasing our ultra-low-energy security solutions for constrained devices at Table 9. These solutions, which are…
Read MoreSensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…
Read MoreSecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board
SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…
Read More