TPM Fail: What It Means and What to Do About It

On November 12, 2019 researchers led by a team at Worcester Polytechnic Institute, disclosed details of two new potentially serious security vulnerabilities — dubbed TPM-Fail — that could allow attackers to steal cryptographic keys protected inside two types of Trusted Platform Modules (TPMs). Because millions of deployed systems probably have the TPM-Fail vulnerability, the scope of exposure is …

TPM Fail: What It Means and What to Do About It Read More »

Trusted Platform Modules: Great Choice, But Maybe Not for Your IoT Products

Interview of Ari Singer, CTO by Ives Brant, Director of Marketing What determines whether you should build a security architecture around TPMs in 2021? We began with Ari Singer, who is CTO here at TrustiPhi and a long-time security architect with two decades in trusted computing. He has chaired both the Trusted Computing Group’s Trusted …

Trusted Platform Modules: Great Choice, But Maybe Not for Your IoT Products Read More »

Supply Chain Security: Malware or Missiles

The recent tragedies of two Boeing 737 MAX-8 passenger jets crashing, despite pilots’ efforts to save them, set off a global alarm about the vulnerability of large, sophisticated aircraft to a flaw in a single subsystem. Cyberattacks on aircraft may well be more cost-effective for hostile entities than targeting with an expensive missile.

The 3 Cybersecurity Rules of Trust

A security CTO’s guidelines to making better decisions about cybersecurity. Rule 1: “All things being equal, trust as little as possible.” Rule 2: “Use evidence and experience to measure trustworthiness.” Rule 3: “Distrust proportionally to the level of risk.” Read full article in Dark Reading…

Trusted Platform Module: 8 *More* Surprises [Part 2]

In Part 1 of this series, we looked at eight surprises about trusted platform modules, targeting common misconceptions. Here in Part 2, we focus on the benefits of TPMs, their important role in the Internet of Things and factors that determine if TPMs can help you. Read the full Part 2 article in IOTWorld

Trusted Platform Module: 8 Surprises for IoT Security

Written by Ari Singer, CTO, TrustiPhi // February 7, 2019 // Part 1 of a two-part TPM Surprise Series Built into billions of devices, a Trusted Platform Module (TPM) is usually a specialized chip on an endpoint’s motherboard that stores cryptographic keys on behalf of its host system for authentication and protection of the endpoint. TPMs will …

Trusted Platform Module: 8 Surprises for IoT Security Read More »