Posts Tagged ‘Security’
Making the Business Case for IoT Security
If you’re an engineer working on products made for the Internet of Things (IoT), you understand the importance of device security, authentication, and data protection. You also know many P&L-fixated executives don’t see an immediate value in funding enhanced IoT product security. Even some of the most technically inclined business leaders have a hard time…
Read MoreIoT in the Movies
The Internet of Things (IoT) has been appearing in movies for several years now—in some cases, even before there was an IoT. Sometimes, the technology depicted is fanciful, but at other times, Hollywood weaves into its narratives technologies that already exist or are looming just over the horizon. Below, we look at the IoT technologies…
Read MoreThe Value of Data Protection in the Internet of Things
The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…
Read MoreThe Biggest IoT Security Threat: Failure of Imagination
IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…
Read MoreSensor Security in Manufacturing and Construction IoT Applications
Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…
Read MoreSecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices
SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions for low-resource IoT devices. Through this partnership, companies can quickly, effortlessly and economically develop high performance, energy-efficient devices using ASICs that deliver strong security. Security is a necessity for most IoT devices. However, 32-, 16-,…
Read MoreCryptographic Security for Keyless Car Entry Systems – Not Gone in 60 Seconds
Recent news reports from sources including Insurance Journal, the National Insurance Crime Bureau and the TODAY Show have highlighted a critical security weakness in some cars and trucks equipped with keyless remotes and pushbutton ignitions. As demonstrated in the following TODAY Show video, thieves are using small, handheld devices that wirelessly replicate the signal of…
Read MoreTop IoT Security Vulnerabilities
As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read MoreMessage to Products in the IoT: An Ounce of Prevention is Worth a Pound of Cure
With the record breaking year of data breaches in 2015, it’s safe to say that many businesses have developed an adequate understanding of the vital need for cybersecurity on products or devices. Then why are so many businesses still only focusing on making their products smart but not secure? Why is technology for IoT security…
Read MoreHow Big is Your Key?
In providing cryptography solutions for wireless sensors and other devices in the Internet of Things we are often asked, Can the encryption be cracked? We think this is the wrong question to ask when evaluating a cipher. Rather, we feel the question a user should ask is How long will it take to crack this…
Read More