Six IoT Security Predictions

These IoT security predictions are based on our experiences throughout the past year, as well as our observations of consumer behavior and the IoT marketplace in general. While there are some clear trends that we predict will gather momentum, the future of IoT security has some uncertainties that are also discussed below. New, Unexpected Things…
Read More

Webinar Replay Available: Rapidly Securing Constrained IoT Devices

Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…
Read More

Webinar Replay Available: Quantum-resistant Cryptography for the IoT

Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…
Read More

Register for our February 9 Webinar: Rapidly Securing Constrained IoT Devices

3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read More

Challenges of Cryptography for Low-energy Devices in the IoT

Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read More

Webinar Replay Available: Jumpstart your IoT Security Project

Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…
Read More

Recruiting at the College Level – Advice for Students

By Joanne Kelleher Last week SecureRF had the opportunity to participate in a career fair sponsored by the University of Connecticut’s School of Engineering. There were 60 firms participating that day plus another 60 who attended another fair earlier in the month. The fairs targeted all UConn engineering and computer science majors who were looking…
Read More
Industrial Cybersecurity

IoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary

IoT / OT / Smart Building / BACnet Cybersecurity Blog Post Summary – list of Veridify Security blog posts back through 2019 2024 Building Management System Cybersecurity Best Practices The Role of Cybersecurity for IoT Devices Monetary Damage of Reported Cybercrime in the US From 2001-2022 BACnet Security Issues and How to Mitigate Cyber Risks…
Read More

Archives