• April 27, 2017

    Imminent Arrival of Quantum Computers Spells Danger for Private Data

    In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. [...]

  • April 24, 2017

    The Biggest IoT Security Threat: Failure of Imagination

    IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies [...]

  • March 30, 2017

    Sensor Security in Manufacturing and Construction IoT Applications

    Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. [...]

  • March 9, 2017

    IoT Security News — Detection Improves,But Gaps Remain

    While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial [...]

  • February 27, 2017

    SecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices

    SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions [...]

  • February 18, 2017

    Six IoT Security Predictions

    These IoT security predictions are based on our experiences as well as our observations of consumer behavior and the IoT [...]

  • January 31, 2017

    Quantum-resistant Cryptography for the IoT

    Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved [...]

  • January 23, 2017

    Rapidly Securing Constrained IoT Devices

    Secure Your Devices in Two Days or Less Watch the on-demand webinar and learn how to rapidly secure your devices with quantum-resistant, [...]

  • January 10, 2017

    Challenges of Cryptography for Low-Resource IoT Devices

    Key Takeaways Low-resource IoT devices face unique cryptographic challenges due to strict limits on power, processing, memory, and storage. Standard [...]

  • January 5, 2017

    Jumpstart Your IoT Security Project

    Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable [...]