IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

The Value of Data Protection in the Internet of Things

The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…
Read More

Imminent Arrival of Quantum Computers Spells Danger for Private Data

In a blog post we published last November, we reported that quantum computers might be available in the next ten to fifteen years. However, with companies including Google and IBM significantly ramping up their efforts to make quantum computing a reality, it is likely that commercial availability for these “super computers” will arrive ahead of…
Read More

The Biggest IoT Security Threat: Failure of Imagination

IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…
Read More

SecureRF to Showcase Quantum-Resistant IoT Security Solutions at IoT DevCon

IoT product developers interested in speaking with our IoT security experts and learning about quantum-resistant authentication and data protection solutions will have their chance at the IoT DevCon conference being held April 26-27 in Santa Clara, CA. We will be showcasing our ultra-low-energy security solutions for constrained devices at Table 9. These solutions, which are…
Read More

Sensor Security in Manufacturing and Construction IoT Applications

Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…
Read More

SecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board

SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…
Read More

IoT Security News — Detection Improves,But Gaps Remain

While IoT security hacks and ransomware attacks have been on the rise, the ability to detect attacks and take remedial action has improved. As evidenced by the IoT-security news items below, IT security staff can spot some types of attacks during or immediately after they occur – but in some cases, even the most stringent…
Read More

SecureRF & BaySand Provide Quantum-Resistant Security for ASIC-powered IoT Devices

SecureRF has joined forces with BaySand, the leader in application-configurable ASICs, to deliver fast, quantum-resistant authentication and data protection solutions for low-resource IoT devices. Through this partnership, companies can quickly, effortlessly and economically develop high performance, energy-efficient devices using ASICs that deliver strong security. Security is a necessity for most IoT devices. However, 32-, 16-,…
Read More

Six IoT Security Predictions

These IoT security predictions are based on our experiences throughout the past year, as well as our observations of consumer behavior and the IoT marketplace in general. While there are some clear trends that we predict will gather momentum, the future of IoT security has some uncertainties that are also discussed below. New, Unexpected Things…
Read More

Webinar Replay Available: Rapidly Securing Constrained IoT Devices

Security is critical for most IoT devices. However, these constrained devices are often deployed with inadequate security because most data protection and authentication solutions are too resource-intensive. View our on-demand webinar to hear how you can secure low-resource IoT devices within a couple of days using asymmetric cryptography methods that do not overwhelm available memory…
Read More

Archives