IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Webinar

Cybersecurity to the Edge for Smart Building Infrastructure

This video is part of a webinar presented by KMC Controls, Veridify Security, and Arrow Intelligent Solutions regarding cybersecurity for smart buildings. A fundamental challenge to securing smart buildings, or any building large enough to have a building automation system, is how to protect devices so that they reject cyber attacks in real-time.  Rejecting a…

Read More

Future-Proof Cybersecurity for Smart Buildings and the Industrial IoT

This video is part of a webinar on cybersecurity for Smart Buildings, Smart Cities, and Industrial IoT. This segment is the part specific to providing cyber protection for smart buildings, building automation, operational technology (OT) networks, and industrial IoT with DOME by Veridify Security. DOME stops cyber attacks before they can happen and is based…

Read More

Webinar – Making Buildings and Industrial IoT Cyber Safe

The increased connectivity of Operational Technology (OT) networks is increasing the cyber attack surface for buildings as well as IT systems.  This webinar will review the different types of cybersecurity that can be deployed in both new and existing facilities, including Veridify’s DOME™ SaaS platform. Key Learnings: The type of cyber threats to Operational Technology…

Read More

IoT Security Update: June 2019

News SecureRF Security Library Receives ISO 26262 Automotive Safety Certification We are excited to announce we have achieved ISO 26262 certification for our development methods used to deliver its advanced automotive security solutions. These methods, used to develop SecureRF’s quantum-resistant security tools, ensure the highest levels of quality for protecting the growing number of processors…

Read More

IoT Security Update: May 2019

News Introducing SecureRF’s New YouTube Channel! Check out our new YouTube channel! This is the place to see news and features on securing the IoT, along with demonstrations, webinars, and other useful information about our quantum-resistant methods that provide authentication and identification for the lowest resource devices. Make sure you subscribe today so you do…

Read More

Webinar Replay Available: Rapidly Securing Constrained IoT Devices

Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…

Read More

Webinar Replay Available: Quantum-resistant Cryptography for the IoT

Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…

Read More

Webinar Replay Available: Jumpstart your IoT Security Project

Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…

Read More