IoT Security
SecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board
SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…
Read MoreSecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions for low-resource IoT devices. Through this partnership, companies can quickly, effortlessly and economically develop high performance, energy-efficient devices using ASICs that deliver strong security. Security is a necessity for most IoT devices. However, 32-, 16-,…
Read MoreSix IoT Security Predictions
These IoT security predictions are based on our experiences throughout the past year, as well as our observations of consumer behavior and the IoT marketplace in general. While there are some clear trends that we predict will gather momentum, the future of IoT security has some uncertainties that are also discussed below. New, Unexpected Things…
Read MoreChallenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read MoreWebinar Replay Available: Jumpstart your IoT Security Project
Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…
Read MoreCryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds
Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a critical security weakness in some cars and trucks equipped with keyless remotes and pushbutton ignitions. As demonstrated in the following TODAY Show video, thieves are using small, handheld devices that wirelessly replicate the signal of…
Read MoreTop IoT Security Vulnerabilities
As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read MoreNewsletters
Newsletters List of Veridify Security Newsletters 2025 2025-APR-Buildings 2025-MAR-Buildings 2025-FEB-Buildings 2024 2024-DEC-Buildings 2024-NOV-Buildings 2024-OCT-Buildings 2024-AUG-Industrial 2024-AUG-Buildings 2024-JUL-Buildings 2024-JUN-Industrial 2024-APR-Buildings 2024-MAR-Buildings 2024-FEB-Buildings 2024-JAN-Buildings 2024-JAN-Industrial ## Main Blog Post Page | Blog Post Summary Page
Read MoreIoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary
Cybersecurity Blog Post Summary – IoT / OT / Smart Building / BACnet List of Veridify Security blog posts back through 2019 2025 Quantum-Resistant Security for IoT and M2M Devices Securing Critical Infrastructure to Reduce OT Cyber Risks and Impacts (webinar) Zero Trust Security for Building Management Systems in Data Centers Zero Trust vs Remote…
Read More