SecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions for low-resource IoT devices. Through this partnership, companies can quickly, effortlessly and economically develop high performance, energy-efficient devices using ASICs that deliver strong security. Security is a necessity for most IoT devices. However, 32-, 16-,…
Read More Six IoT Security Predictions
These IoT security predictions are based on our experiences throughout the past year, as well as our observations of consumer behavior and the IoT marketplace in general. While there are some clear trends that we predict will gather momentum, the future of IoT security has some uncertainties that are also discussed below. New, Unexpected Things…
Read More Webinar Replay Available: Rapidly Securing Constrained IoT Devices
Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…
Read More Webinar Replay Available: Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…
Read More Register for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read More Challenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read More Webinar Replay Available: Jumpstart your IoT Security Project
Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…
Read More Cryptography Basic for Chip Design Engineers
The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part in a communication). While codes and encryption have existed in one form or another since ancient times, it’s thanks to advances in electronic cryptographic systems since the 1970s that today we enjoy things like secure…
Read More Cryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds
Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a critical security weakness in some cars and trucks equipped with keyless remotes and pushbutton ignitions. As demonstrated in the following TODAY Show video, thieves are using small, handheld devices that wirelessly replicate the signal of…
Read More Lightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…
Read More