• January 3, 2018

    NIST Accepts SecureRF’s WalnutDSA for Evaluation

    SecureRF's Walnut Digital Signature Algorithm (WalnutDSA) has been accepted by the National Institute of Standards and Technology (NIST) for evaluation as [...]

  • December 22, 2017

    IoT Security News: DoS Attack at Your Door and Semiconductor Stats

    IoT security and semiconductor industry growth were two of hottest tech-related topics in 2017. Every few weeks, we learned about [...]

  • December 22, 2017

    Beware the Holiday Hack

    Most online 2017 holiday gift guides have one thing in common: IoT gadgets. Wi-Fi video doorbells, wearable health monitors, phone-controlled [...]

  • December 21, 2017

    New Paper: Kayawood Key Agreement Protocol

    SecureRF has published a new paper, “Kayawood, a Key Agreement Protocol,” which introduces a group-theoretic key agreement protocol that leverages the [...]

  • November 22, 2017

    26% of Execs Say Security Impedes IoT Implementation

    The IoT presents exciting new opportunities for companies to develop innovative products and services. However, despite the benefits associated with [...]

  • November 22, 2017

    IoT Security News: Cyber Shield, IoTroop, and the Quantum Race

    It is an exciting (and challenging!) time for engineers, developers, and business leaders working on IoT security-related solutions. There are [...]

  • October 26, 2017

    SecureRF Wins ARM TechCon Innovation Award

    SecureRF was recognized Wednesday with the Best Contribution to IoT Security award at this year's ARM TechCon in Santa Clara, [...]

  • October 17, 2017

    Ask SecureRF: AES for Authentication?

    Question: AES is used successfully all the time. Why shouldn’t we use AES for authentication? SecureRF: AES is a range [...]

  • October 14, 2017

    Securing the Internet of Vehicles Is Possible

    Another month and yet another story about the vulnerability of modern vehicles to hackers looking to take control of our [...]

  • October 14, 2017

    IoT Security News: Principles of IoT Security, PKI Trends, and the Encryption Debate

    In the face of seemingly endless cybersecurity breaches and IoT hacks, it is important to actively stay abreast of security [...]