IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Department of Defense

SecureRF Announces Multi-Mode Sensor LIME Tag for the IoT, and an Update to its Credentialing Solution

New MY01 LIME Tag provides integrated Cellular, Bluetooth Low Energy (BLE), classic Bluetooth, and Near Field Communication (NFC) connectivity on single platform with security and sensors MY01 utilizes Public-Key Infrastructure (PKI) for identification, authentication and symmetric security for on-tag data protection Integrates with Veridify Internet of Things (IoT) cloud-based platform for real-time visibility and monitoring…

Read More

SecureRF Presenting at Air Force Sustainment Center Small Business Industry Days

On July 14th – 15th, SecureRF CEO, Louis Parks, presented the revolutionary Veridify Anti-Counterfeiting Method at the Air Force Sustainment Center Small Business Industry Days event in Macon, GA. Veridify is the world’s first “linear-in-time” security method addressing authentication and data protection for the global supply chain. To learn more about the event, click here.

Read More

The Honorable Dr. James I. Finley joins SecureRF as SVP of Aerospace and Defense

SecureRF Corporation, a provider of identification, authentication, and data protection technology for the Internet of Things (IoT), announced that the Honorable Dr. James I. Finley has joined the management team as Senior Vice President of Aerospace and Defense. Dr. Finley, the Former U.S. Deputy Undersecretary of Defense will provide SecureRF guidance on military initiatives. Read…

Read More

Upcoming Supply Chain Assurance Events

You know when you start seeing a lot of new conferences and forums around a particular technology that it is getting to be a hot topic. Cybersecurity events have been on the rise for the last few years and right now, Supply Chain Assurance events are hot, especially around counterfeit electronics. SecureRF is participating in…

Read More

Counterfeit Electronic Parts Are a ‘Ticking Time Bomb’

Counterfeit electronic parts are increasingly becoming so much of a problem that it is costing “the U.S. government and its contractors billions [of dollars] each year” while consumer and industrial businesses are losing approximately $250 billion annually. Industry Weekly explains the process in which these counterfeit parts are constructed. E-waste, or scrapped electronic parts, is…

Read More

The Anti-counterfeiting Update Blog

We have launched a new blog: the Anti-counterfeiting Update. This blog will discuss views and news about authentication solutions, anti-counterfeiting and brand protection. Topics will include issues and current anti-counterfeiting/authentication approaches. The RFID Security Blog will continue to focus on the more technical side of cryptography and security issues along with applications such as tracking,…

Read More

Meeting the Standards That Don’t Apply

Contributed by Joanne C. Kelleher The Hawaii Natural Energy Institute put together The Maui Smart Grid Project team to evaluate new smart-grid technologies and collect feedback from the community. A recent article in the Maui News, Smart Grid Project Concerns Addressed, said : The project team considers the safety and satisfaction of participants extremely important, and there…

Read More

Hacking Hardware a Military Concern

Contributed by Joanne C. Kelleher Per the New York Times, more than $3.5 billion of integrated circuits are bought annually for use in U.S. military gear. Only about 2 percent of these are manufactured in secure facilities run by American companies and the United States lacks the ability to fulfill the capacity requirements needed to…

Read More

Robots (and Humans) being Wired for War

Contributed by Joanne C. Kelleher I recently finished reading Wired for War: The Robotics Revolution and Conflict in the 21st Century by P.W. Singer (2009).  The book covered the historical impact of major technological changes on warfare methods and strategies, the development of robots, the ethics of using robots in a conflict situation and the…

Read More