April 27, 2017
Imminent Arrival of Quantum Computers Spells Danger for Private Data
In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. [...]
April 24, 2017
The Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies [...]
March 30, 2017
Sensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. [...]
March 9, 2017
IoT Security News — Detection Improves,But Gaps Remain
While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial [...]
February 27, 2017
SecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions [...]
February 18, 2017
Six IoT Security Predictions
These IoT security predictions are based on our experiences as well as our observations of consumer behavior and the IoT [...]
January 31, 2017
Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved [...]
January 23, 2017
Rapidly Securing Constrained IoT Devices
Secure Your Devices in Two Days or Less Watch the on-demand webinar and learn how to rapidly secure your devices with quantum-resistant, [...]
January 10, 2017
Challenges of Cryptography for Low-Resource IoT Devices
Key Takeaways Low-resource IoT devices face unique cryptographic challenges due to strict limits on power, processing, memory, and storage. Standard [...]
January 5, 2017
Jumpstart Your IoT Security Project
Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable [...]

