News and Press

TrustiPhi announces Triathlon, the IoT Security Management Platform for Micron Authenta[tm]

Triathlon Will Enable OEMs and Device Operators to Easily Deploy Fleets of Micron Authenta-Equipped IoT Devices and Securely Manage Their Life Cycle

August 27, 2021 – TrustiPhi today announced its Triathlon for Micron Authenta(TM) solution for manufacturers and OEMs of endpoint products, operators of Internet of Things (IoT) device fleets, and providers of services that require hardware-level device security.  Triathlon, designed as the IoT security management platform that Puts Authenta Into Action, makes it easier and simpler to overcome the global challenge of the insecure IoT by incorporating Micron AuthentaTM into new products and leveraging its capabilities to meet compliance requirements, harden devices against tampering, safeguard IoT device fleets, and make new services and business models feasible. Read announcement...

TPM Fail: What It Means and What to Do About It

Published in Dark Reading November 19, 2019

By Ari Singer, CTO, TrustiPhi

In November 2019, researchers led by a team at Worcester Polytechnic Institute disclosed details of two new, potentially serious security vulnerabilities — dubbed TPM Fail — that could allow attackers to steal cryptographic keys protected inside two types of Trusted Platform Modules (TPMs). Because millions of deployed systems probably have the TPM Fail vulnerability, the scope of exposure is… Read More

How Can We Make Election Technology Secure?

Paper ballots, defense in depth, and hardware-level security are all key

Published in Dark Reading February 6, 2020

By Ari Singer, CTO, TrustiPhi and Ives Brant

This image has an empty alt attribute; its file name is PR-DarkRead-Election-Security-Part-1-Feb2020.jpg

Let’s go back to November 5, 2019:

In November 2019, a year before the presidential election, in Northampton County, Pennsylvania, a candidate for judge, Abe Kassis, came up with just 164 votes out of 55,000 cast — a statistical absurdity. After hand scanning the ballots from the county’s new ESS ExpressVoteXL machines, that outcome was reversed, and Kassis emerged as winner. This was no case of “disinformation warfare” and nobody alleged voter fraud nor mishandling of ballots by election workers — so what happened? Read more

5 Measures to Harden Election Technology

Voting machines need hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable.

Published in Dark Reading February 7, 2020

By Ari Singer, CTO, TrustiPhi and Ives Brant

This article, second in a two-part series, looks at concrete, common-sense steps to make our election technology a harder target, even for the world’s best-resourced hackers. While writing this series, although TrustiPhi has worked directly to help makers of voting technology boost their security, we did reach out to recognized experts for their perspective. An unexpected twist: one of our calls landed directly in one authority’s teleconference with a Hollywood scriptwriter seeking background and ideas. This expert observed wryly that no Hollywood script could capture the dramatic and pressing need to harden election technology against attack. Read More…