• December 27, 2016

    Cryptography Basic for Chip Design Engineers

    The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part [...]

  • December 23, 2016

    Cryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds

    Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a [...]

  • November 29, 2016

    Lightweight Cryptography for Embedded Systems in the IoT

    Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems [...]

  • November 21, 2016

    IoT Security Hacks With a Common Thread

    Security of the Internet of Things (IoT) has been in the news lately, for all the wrong reasons. In addition [...]

  • November 10, 2016

    Quantum Computing’s Threat to Current Cryptosystems – And What We Can Do About It

    The security of the digital world we live in—our banking systems, online communications, national defense infrastructure, and even everyday internet [...]

  • September 20, 2016

    Top IoT Security Vulnerabilities

    As consumers become more familiar with the Internet of Things, they're opening their eyes to the IoT security threats that [...]

  • January 26, 2016

    Message to Products in the IoT: An Ounce of Prevention is Worth a Pound of Cure

    With the record breaking year of data breaches in 2015, it's safe to say that many businesses have developed an [...]

  • January 6, 2016

    Securing the IoS – the Internet of Sensors

    The Internet of Things is talking loud and clear and nearly anyone can listen. Sensors are on almost everything from [...]

  • December 23, 2015

    SecureRF Collaborates with University at Buffalo Mathematics Doctoral Students to Study Algebraic Eraser

    SecureRF, a leading provider of security solutions for the Internet of Things, announces their participation in an innovative research program [...]

  • September 9, 2014

    How Big is Your Key?

    In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can [...]