Trusted Platform Modules: Great Choice, But Maybe Not for Your IoT Products

Interview of Ari Singer, CTO by Ives Brant, Director of Marketing Q: What is a practical use of TPMs in the Internet of Things? Ari: System designers can use TPMs to make it extremely difficult for a bad actor to swap out a system component without it being caught. For example, in automotive electronic control …

Trusted Platform Modules: Great Choice, But Maybe Not for Your IoT Products Read More »

Announcing Triathlon, the IoT Security Management Platform for Micron Authenta

Triathlon Will Enable OEMs and Device Operators to Easily Deploy Fleets of Micron Authenta-Equipped IoT Devices and Securely Manage Their Life Cycle June 17, 2021 – TrustiPhi today announced its Triathlon for Micron Authenta(TM) solution for manufacturers and OEMs of endpoint products, operators of Internet of Things (IoT) device fleets, and providers of services that …

Announcing Triathlon, the IoT Security Management Platform for Micron Authenta Read More »

TPM Fail: What It Means and What to Do About It

On November 12, 2019 researchers led by a team at Worcester Polytechnic Institute, disclosed details of two new potentially serious security vulnerabilities — dubbed TPM-Fail — that could allow attackers to steal cryptographic keys protected inside two types of Trusted Platform Modules (TPMs). Because millions of deployed systems probably have the TPM-Fail vulnerability, the scope of exposure is …

TPM Fail: What It Means and What to Do About It Read More »

TPM or Authenta for the IoT: Which is a Better Fit?

Micron has integrated security technology into a flash memory chip, creating a two-in-one device that offers capabilities for attestation, secure boot, and other differentiating security capabilities, with no additional chips or changes to circuit boards. Get a clear picture of why Authenta has the potential to displace TPM as the hardware security technology of choice …

TPM or Authenta for the IoT: Which is a Better Fit? Read More »

Supply Chain Security: Malware or Missiles

The recent tragedies of two Boeing 737 MAX-8 passenger jets crashing, despite pilots’ efforts to save them, set off a global alarm about the vulnerability of large, sophisticated aircraft to a flaw in a single subsystem. Cyberattacks on aircraft may well be more cost-effective for hostile entities than targeting with an expensive missile.

The 3 Cybersecurity Rules of Trust

A security CTO’s guidelines to making better decisions about cybersecurity. Rule 1: “All things being equal, trust as little as possible.” Rule 2: “Use evidence and experience to measure trustworthiness.” Rule 3: “Distrust proportionally to the level of risk.” Read full article in Dark Reading…

Trusted Platform Module: 8 *More* Surprises [Part 2]

In Part 1 of this series, we looked at eight surprises about trusted platform modules, targeting common misconceptions. Here in Part 2, we focus on the benefits of TPMs, their important role in the Internet of Things and factors that determine if TPMs can help you. Read the full Part 2 article in IOTWorld

Trusted Platform Module: 8 Surprises for IoT Security

Written by Ari Singer, CTO, TrustiPhi // February 7, 2019 // Part 1 of a two-part TPM Surprise Series Built into billions of devices, a Trusted Platform Module (TPM) is usually a specialized chip on an endpoint’s motherboard that stores cryptographic keys on behalf of its host system for authentication and protection of the endpoint. TPMs will …

Trusted Platform Module: 8 Surprises for IoT Security Read More »