Posts Tagged ‘IoT’
26% of Execs Say Security Impedes IoT Implementation
The IoT presents exciting new opportunities for companies to develop innovative products and services. However, despite the benefits associated with IoT technology, such as system monitoring and inventory control, many business leaders continue to cite IoT security-related challenges as obstacles to more rapid IoT adoption. According to a recent Economist Intelligence Unit (EIU) report, sponsored…
Read MoreSecureRF Wins ARM TechCon Innovation Award
SecureRF was recognized Wednesday with the Best Contribution to IoT Security award at this year’s ARM TechCon in Santa Clara, CA. The company impressed the judges with two of its public-key security solutions, Ironwood™ Key Agreement Protocol (Ironwood KAP™) and Walnut Digital Signature Algorithm (WalnutDSA™), which are quantum-resistant security solutions for low-resource processors and embedded devices. Engineers…
Read MoreLouis Parks to Speak on Security Panel at the 15th International SoC Conference
Louis Parks, CEO of SecureRF Corporation, will be a panelist at the 15th International System-on-Chip (SoC) Conference on October 19, 2017. Parks will join moderator Farhad Mafie, International SoC Conference Chairman, and five other thought leaders to discuss SoC-related security challenges and solutions. In a discussion titled, “Security Issues and Challenges in The Next Generation of…
Read MoreSecureRF Profiled at StaceyOnIoT.com
SecureRF and its CEO Louis Parks were recently profiled by Stacey Higginbotham in the weekly IoT-based Stacey Knows Things newsletter and at StaceyOnIoT.com. Parks described some of the various challenges associated with securing the IoT, and he talked to Higginbotham about SecureRF’s cryptography solutions for low-resource devices, such as 8- and 16-bit microcontrollers.
Read MoreIoT Security News – Still Many Ports of Entry for Malefactors
Every device connected to the internet is a potential point of vulnerability. As the following report shows, design engineers and developers must anticipate security threats at every stage between a device’s design and deployment. Remote Peeping into Bedrooms and Offices In June 2017, some residents of Dubai, UAE, discovered to their alarm that footage from…
Read MoreMaking the Business Case for IoT Security
If you’re an engineer working on products made for the Internet of Things (IoT), you understand the importance of device security, authentication, and data protection. You also know many P&L-fixated executives don’t see an immediate value in funding enhanced IoT product security. Even some of the most technically inclined business leaders have a hard time…
Read MoreIoT in the Movies
The Internet of Things (IoT) has been appearing in movies for several years now—in some cases, even before there was an IoT. Sometimes, the technology depicted is fanciful, but at other times, Hollywood weaves into its narratives technologies that already exist or are looming just over the horizon. Below, we look at the IoT technologies…
Read MoreIoT Security News — Issues with Authentication and Open Ports
When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…
Read MoreRegister for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read MoreChallenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read More