Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

Recent Support for IoT Security and Quantum Technology Legislation

Small business owners are embracing the benefits of connected technologies and the IoT, but in many cases they are not addressing the security vulnerabilities that come with connected technologies. This type of behavior is encouraging lawmakers to propose IoT security legislation like California’s  connected devices security bill, the first of its kind. While federal legislation for IoT security…
Read More

California IoT Security Bill Highlights Need to Secure the IoT

California’s recent decision to pass a new IoT security bill underscores the importance of securing the IoT and will likely pave the way for clearer and more consistent standards to protect consumers and their data from fraud and abuse. The connected devices security bill, recently signed into law by Governor Jerry Brown, requires IoT devices…
Read More

Consumers Are Concerned About IoT Security

Consumer adoption of smart devices is at an all-time high and poised to grow. Despite the continued growth of connected devices, many consumers are still concerned about the security of those devices, and for good reason. The cost of an attack on an IoT device is high – device manufacturers can potentially see penalties of hundreds…
Read More

Critical IoT Security Issues in the News

As the number of IoT sensors and devices increases, so does the number and variety of threats to the networks they are connected to. Given the fact that many of these devices are not properly secured, security failures are almost inevitable. But the consequences of such access might be larger than what we previously imagined.…
Read More

Who is Responsible for Securing the IoT?

We all love progress, especially when it comes to our gadgets. Everything from thermostats to grilling equipment is now potentially connected, opening a broad range of functions and opportunities for convenience and pleasure. A big reason for the increased functionality we enjoy today is the broad ecosystem that has evolved to connect everything to everyone…
Read More

Use of IoT Devices as a ‘Fly on the Wall’ During Trump and Putin Meeting–Why We Should Care and What We Should Do

There is something about a closed-door meeting that seems to spark everyone’s curiosity. We cannot help but wonder who might be the subject of conversation or what is so secretive. So, when two heads of state meet privately sans their usual entourage, as the leaders of the United States and Russia did recently in Helsinki,…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. SecureRF’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.