Posts by Veridify Security
Securing the IoS – the Internet of Sensors
The Internet of Things is talking loud and clear and nearly anyone can listen. Sensors are on almost everything from cars, refrigerators and wearables, to a town’s streetlights, water supply systems and air quality tracking devices. People’s lives are made easier and more efficient with the delivery of helpful data and information in seconds. The…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read MoreSecurity Is Not Just Encrypting Data
When I meet people and they ask me what my company does, the dialogue in 2010 often used to go like this: Them: What do you do? Me: My company provides security solutions for wireless sensors and RFID. Them: Oh, so you encrypt data. If I was running to catch a train, a benefit of…
Read MorePrivacy versus Security
If you have been affiliated with Automated Identification Technology (AIT), Machine to Machine (M2M) communications or the Internet of Things (IoT) in any way, you are probably very familiar with the worldwide concerns that have been raised around privacy and security. In fact, we often think of privacy and security as a single issue and…
Read MoreWhat is Cryptography?
Cryptography and Encryption Cryptography is the science of securing information and communications by transforming data into a coded format, ensuring that only authorized parties can access and understand it. At its core, cryptography uses mathematical algorithms and keys to convert plaintext (readable data) into ciphertext (an unreadable, encrypted form), a process known as encryption. Decryption…
Read MoreAn Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices
Contributed by Joanne C. Kelleher What is the difference between private key and public key cryptography? What is the difference between symmetric and asymmetric cryptography? What is the difference between Diffie-Hellman (Elliptic Curve) and RSA asymmetric cryptography methods? Since SecureRF’s Algebraic Eraser technology offers a combination of symmetric (i.e. private key or secret key) and…
Read MoreSample Building Address
XYZ Properties [XYZ Properties] has partnered with Veridify Security to protect the building control systems with DOME™. The result is that the building control systems and the operations of the building are protected from unauthorized access, manipulation, or shutdown. Critical Risks to Buildings Buildings are increasingly at risk through the use of technologies that…
Read MoreTopic Tags
Blog Topic Tags access-control aes ahr-expo anshel arm arm-techcon arrow-chameleon96 artificial-intelligence asymmetric authentication auto automotive automotive-security award bacnet bas-cybersecurity baysand biulding-automation bloomberg botnet building-management-system connected-devices crtical-infrastructure culture cyberattack cybercrime cyber-physical-security cybersecurity cybersecurity-governance cybersecurity-risk-assessment data-breach data-center data-security de10-nano de10-nano-security-toolkit development-kit dnp3 dos ecu embedded-devices embedded-system embedded-systems embedded-world encryption energy event fda fpga hack hacking healthcare hvac…
Read MoreNewsletters
Newsletters List of Veridify Security Newsletters 2025 2026-JUN-Buildings 2025-MAY-Buildings 2025-APR-Buildings 2025-MAR-Buildings 2025-FEB-Buildings 2024 2024-DEC-Buildings 2024-NOV-Buildings 2024-OCT-Buildings 2024-AUG-Industrial 2024-AUG-Buildings 2024-JUL-Buildings 2024-JUN-Industrial 2024-APR-Buildings 2024-MAR-Buildings 2024-FEB-Buildings 2024-JAN-Buildings 2024-JAN-Industrial ## Main Blog Post Page | Blog Post Summary Page
Read MoreIoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary
Cybersecurity Blog Post Summary – IoT / OT / Smart Building / BACnet List of Veridify Security blog posts back through 2019 2025 Protecting Airport Baggage Handling Systems from Cyberattack Cybersecurity Challenges in Retrofitted Smart Buildings Zero Trust Security for Legacy OT Devices Quantum-Resistant Security for IoT and M2M Devices Securing Critical Infrastructure to Reduce…
Read More