Posts Tagged ‘Cryptography’

Evaluate Us Your Way: Free SecureRF Security SDKs Available on the Platform of Your Choice

We provide software development kits (SDKs) for a multitude of processors, microcontrollers (MCUs) and development boards so you can evaluate SecureRF’s cryptographic methods on the platform of your choice. Our SDKs contain our libraries compiled for your target processor, along with example source code in C, sample keys, certificates, and digital signatures. SDKs created for…

Read More

Who is Responsible for Securing the IoT?

We all love progress, especially when it comes to our gadgets. Everything from thermostats to grilling equipment is now potentially connected, opening a broad range of functions and opportunities for convenience and pleasure. A big reason for the increased functionality we enjoy today is the broad ecosystem that has evolved to connect everything to everyone…

Read More

Meet 20 of the Most Powerful Women in Technology

Dr. Iris Anshel, Chief Scientist at SecureRF, has been included in a select list of  20 of the most influential women in technology as reported by Yolande D’Mello in her article for AiThority. Dr. Anshel earned a Ph.D. in math from Columbia, co-developed the foundational group theoretic methods that underlie all SecureRF protocols, and has…

Read More

NIST Post-Quantum Cryptography Standardization Project and SecureRF

Quantum computing is moving  from theory to reality. MIT and commercial entities including IBM, Microsoft, and Google have already delivered elementary quantum computing platforms. When large-enough quantum computers are built, known algorithms will be able to weaken or break most of the public-key methods now in use. Concerns over the security threat this represents are…

Read More

Women in Tech: Iris Anshel (Chief Scientist, SecureRF)

Iris Anshel, Chief Scientist at SecureRF, is featured in EE Times’s “Women in Tech: 25 Profiles in Persistence.” She was interviewed along with 24 other women in tech—including scientists, engineers, and executives—from companies such as Qualcomm, STMicroelectronics, and Texas Instruments. In the interview, Anshel talks about using her background in combinatorial group theory to develop cryptographic primitives and protocols…

Read More

The Value of Data Protection in the Internet of Things

The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…

Read More

Imminent Arrival of Quantum Computers Spells Danger for Private Data

In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…

Read More

The Biggest IoT Security Threat: Failure of Imagination

IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…

Read More

Sensor Security in Manufacturing and Construction IoT Applications

Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…

Read More