IoT in the Movies
The Internet of Things (IoT) has been appearing in movies for several years now—in some cases, even before there was an IoT. Sometimes, the technology depicted is fanciful, but at other times, Hollywood weaves into its narratives technologies that already exist or are looming just over the horizon. Below, we look at the IoT technologies…
Read More IoT Security News — Issues with Authentication and Open Ports
When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…
Read More IoT Security Vulnerabilities of Smart Cities
As IoT devices become smaller and cheaper, more cities are leveraging them to transform themselves into smart cities. Smart cities use IoT devices and technologies to improve the efficiency of their services and assist their citizens in a variety of ways. Smart city IoT applications include: Traffic-management systems that reduce congestion and save money on…
Read More The Value of Data Protection in the Internet of Things
The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…
Read More Imminent Arrival of Quantum Computers Spells Danger for Private Data
In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…
Read More The Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…
Read More SecureRF to Showcase Quantum-Resistant IoT Security Solutions at IoT DevCon
IoT product developers interested in speaking with our IoT security experts and learning about quantum-resistant authentication and data protection solutions will have their chance at the IoT DevCon conference being held April 26-27 in Santa Clara, CA. We will be showcasing our ultra-low-energy security solutions for constrained devices at Table 9. These solutions, which are…
Read More Sensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…
Read More SecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board
SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…
Read More IoT Security News — Detection Improves,But Gaps Remain
While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial action has improved. As evidenced by the IoT-security news items below, IT security staff can spot some types of attacks during or immediately after they occur – but in some cases, even the most stringent…
Read More