Posts Tagged ‘webinar’
Building Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure
Watch this webinar replay of “Building Automation Systems, Smart Buildings, and 5 Ways to Make Them Cyber Secure” to learn about cybersecurity for buildings. Buildings are becoming more connected and more at risk to cyberattacks. This webinar will address the following items: • Connected building trends • Building controls advancements and operating efficiencies • Connected…
Read MoreMitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure
Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks, and studies…
Read MoreWebinar – Making Buildings and Industrial IoT Cyber Safe
Making Buildings and Industrial IoT Cyber Safe The increased connectivity of Operational Technology (OT) networks is increasing the cyber attack surface for buildings as well as IT systems. This webinar will review the different types of cybersecurity that can be deployed in both new and existing facilities, including Veridify’s DOME™ SaaS platform. Key Learnings: The…
Read MoreIoT Security Update: June 2019
News SecureRF Security Library Receives ISO 26262 Automotive Safety Certification We are excited to announce we have achieved ISO 26262 certification for our development methods used to deliver its advanced automotive security solutions. These methods, used to develop SecureRF’s quantum-resistant security tools, ensure the highest levels of quality for protecting the growing number of processors…
Read MoreIoT Security Update: May 2019
News Introducing SecureRF’s New YouTube Channel! Check out our new YouTube channel! This is the place to see news and features on securing the IoT, along with demonstrations, webinars, and other useful information about our quantum-resistant methods that provide authentication and identification for the lowest resource devices. Make sure you subscribe today so you do…
Read MoreWill Enterprise Prioritize IoT Security Over Innovation in 2019?
This month we highlight security issues of concern to both consumers and enterprises, and we also share video from SecureRF’s participation at recent key industry events. News Six Security Issues Set to Dominate IoT in 2019 The implementation of IoT security is expected to be a top priority for businesses this year, even at…
Read MoreWebinar Replay Available: Rapidly Securing Constrained IoT Devices
Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…
Read MoreWebinar Replay Available: Quantum-resistant Cryptography for the IoT
Customer concerns related to IoT security are becoming more prevalent as IoT moves into the mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16- and even 8-bit processors are not able to implement contemporary security solutions with acceptable runtime and resource allocation. This on-demand webinar is a special opportunity…
Read MoreRegister for our February 9 Webinar: Rapidly Securing Constrained IoT Devices
3rd webinar in our series: How to add authentication and data protection to your IoT devices in two days or less The rush to deploy connected devices such as industrial sensors, consumer electronics, vehicles, medical devices and wearables creates significant opportunities for manufacturers. However, many companies are risking brand damage, revenue loss and more by…
Read MoreWebinar Replay Available: Jumpstart your IoT Security Project
Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. As IoT and IIoT adoption grows and customer concerns about security issues increase, so does the need for a solution. Watch our webinar…
Read More