Resources

pki-build-secure-iot-devices
White paper
IoT & IIoT security

PKI for IoT: How to Deliver Secure IoT Products to Market

Public key infrastructure (PKI) is the most effective solution to build a trusted cryptographic identity into each device at massive scale.   The Internet of Things (IoT) is transforming the world we live in – and fast. Companies are now de...
Building design concept. Engineering of autonomous system of smart building. Drafting of communications of house. Project development of apartment house. Architectural drawing, blueprint of facade.
Blog post
IoT & IIoT security
Manufacturing

How Product and Manufacturing Leaders Rate IoT Device Security in 2022

Plus a look at what they’re doing to strengthen security going forward The Internet of Things (IoT) hasn’t just arrived – it’s exploding before our eyes.  Every “thing” is now connected : think watches, doorbells, medical devices, vehicles, the list g...
IoT-Device-Security-in-2022
Industry report
IoT & IIoT security
Manufacturing

Product and Manufacturing Leaders on IoT Device Security

Pulse and Keyfactor surveyed 100 product and manufacturing leaders to discover their IoT deployments, how they rate their security strategy and approach, and what challenges they face. With the exploding number of connected devices, the Internet o...
iStock-1313494602-scaled
Blog post
IoT & IIoT security
Manufacturing

Why Zero Trust Manufacturing Is Critical to Building Trusted IoT Devices

The internet of things (IoT) has arrived , and so have a host of security challenges along with it. Despite the fact that complex manufacturing supply chains mean attackers have many avenues to compromise a device, security is often bolted on...
zero-trust-manufacturing-navigate-complex-supply-chains-white-paper
White paper
IoT & IIoT security
Supply chain security

How to Navigate Complex Supply Chains to Build Trusted IoT Devices

Learn how a "zero trust" approach ensures the safety of your devices from the production floor to the end-user. Manufacturing supply chains continue to get more complex, and it has becoming increasingly difficult to build IoT that can be t...
Tech-Update-Prepare-PKI-for-Quantum-Computing
Tech update
Cryptography Solution

How to prepare your PKI for quantum computing

The eventual arrival of quantum computers means that most of the algorithms we currently rely on for public key infrastructure (PKI) will no longer be secure. By being crypto agile and trying out the new Post-Quantum Cryptography (PQC) algorithms, you c...

Pro tip: You can also find your answers in PrimeKey Wiki

Contact us

Fill in your contact information below and we will get in touch with you.