Steve Hanna
@steve_hanna
Followers
80
Following
0
Media
1
Statuses
21
Security geek for 15+ years. Now working on IoT security at Infineon.
Boston, MA USA
Joined May 2009
To see how @JuniperNetworks is using the @Infineon OPTIGA TPM to secure their routers, come see our demo in booth 6C41 at #MWC2018.
0
4
8
A6a For legacy systems, layer security on top. See TCG @TrustedComputin Architect’s Guide: https://t.co/IvHczBkTaT
#IICSecurity #IoTSecurity
0
3
2
A6 To check your system's security, hire an outsider to review it. https://t.co/ZL7yYDhuNU
#IICSecurity #ISPN #IoTSecurity
0
3
2
A5 Security functions for industrial IoT? See the list at https://t.co/i3AZXRn9Tn
#IICSecurity #IoTSecurity #Infineon
0
3
3
A4 Interoperability is key for maximizing value while minimizing cost. #IICSecurity #IoTSecurity #Infineon
0
1
2
A4 Kerckhoffs’s Principle says that security by obscurity doesn't work. Properly designed open systems are more secure. #IICSecurity
0
5
7
A4 Open standards for security? Yes. Two reasons: Kerckhoffs’s Principle and interoperability. #IICSecurity #IoTSecurity #Infineon
0
5
4
A3 Industrial Internet benefits > risks? Yes, if you secure things properly. No, otherwise. #IICSecurity #IoTSecurity #Infineon
0
3
4
A2 Intentional threats need stronger measures: cryptography and built-in hardware security. #TPM #IICSecurity #IoTSecurity
0
3
5
A2 #IICSecurity Unintentional threats require easy but strong user authentication for significant actions #IoTSecurity @FIDOalliance
0
2
2
A2 #IICSecurity Unintentional threats are common but often ignored. Example? Olympic Pipeline Explosion https://t.co/arNa5VlDXW
#IoTSecurity
0
3
5
A4: For manufacturing security, check out the talk I'm giving today at #iotasia : http://t.co/LBOCOQVls7 #IIC24 #IoTDay
1
0
1
Heard about the TPM hack? See the TCG response at http://bit.ly/anKPfS Explains why you shouldn't worry
0
0
0