April 27, 2017
Imminent Arrival of Quantum Computers Spells Danger for Private Data
In a previous blog post, we reported that quantum computers might be available in the next ten to fifteen years. [...]
April 24, 2017
The Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies [...]
March 30, 2017
Sensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. [...]
March 9, 2017
IoT Security News — Detection Improves,But Gaps Remain
While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial [...]
February 27, 2017
SecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions [...]
February 18, 2017
Six IoT Security Predictions
These IoT security predictions are based on our experiences as well as our observations of consumer behavior and the IoT [...]
January 10, 2017
Challenges of Cryptography for Low-Resource IoT Devices
Key Takeaways Low-resource IoT devices face unique cryptographic challenges due to strict limits on power, processing, memory, and storage. Standard [...]
December 27, 2016
Cryptography Basic for Chip Design Engineers
The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part [...]
December 23, 2016
Cryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds
Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a [...]
November 29, 2016
Lightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems [...]

