Register for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read More Challenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read More Webinar Replay Available: Jumpstart your IoT Security Project
Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…
Read More Recruiting at the College Level – Advice for Students
By Joanne Kelleher Last week SecureRF had the opportunity to participate in a career fair sponsored by the University of Connecticut’s School of Engineering. There were 60 firms participating that day plus another 60 who attended another fair earlier in the month. The fairs targeted all UConn engineering and computer science majors who were looking…
Read More - « Previous
- 1
- …
- 8
- 9
- 10