Spotlight On
A spotlight on Secure RF
This month’s spotlight shines on Louis Parks, CEO of SecureRF. He talks to CIE about the rise of IoT devices and how the company are staying ahead of the IoT market
S
ecureRF has been around for 13 years. How has the IoT market changed in that time, and has the company had to change because of this?
During our company’s history, there have always been devices, but there has not always been the term Internet of Things. So, the best way to describe the market when we started would be to say that there were small things that needed some
level of security. However, there probably wasn't as cohesive a view of what type or how much security was required, because the label of IoT didn’t exist. Defining this has helped to bring to light the broad range of security challenges faced by these devices.
Over time, the IoT market has expanded significantly. The IoT, with its billions of processors, has received a lot of attention, which in turn has raised the visibility of what is secure and what is not. Previously,
we would have addressed the security concerns at either the network level or at the device level. Now, as things are more connected, with the advent of cloud computing and IoT platforms, data is immediately running up into the cloud and being accessed from places we would never have imagined 13 years ago.
With a rise in hacking devices such as smart devices in the home, how are you making sure these are securely protected? How will these be future proofed?
SecureRF is not specifically looking to secure home, automotive, or implantable medical devices. We provide tools to the engineers who are addressing these markets. When we say we are a security technology company, people often think,
Louis Parks, CEO of SecureRF
“Oh, so you encrypt data.” That is not quite right. Although encrypting and decrypting data is certainly an important security feature or function, much of what is involved in securing devices has to do with identification and authentication, which is to ask, “Is this digital thing what it says it is?" For example, if you receive an e-mail from your bank, is it really your bank on the other end or somebody trying to gather data maliciously?
Device identification is critical, especially in a home where an IoT device can potentially impact other devices in a negative way or monitor you in ways you do not want to be monitored. Authenticating commands that are being sent to devices is also critical. We provide identification, authentication, and data protection tools that can be used in very small, resource-constrained devices.
32 October 2017
Components in Electronics
www.cieonline.co.uk
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60