Steve Hanna Profile
Steve Hanna

@steve_hanna

Followers
80
Following
0
Media
1
Statuses
21

Security geek for 15+ years. Now working on IoT security at Infineon.

Boston, MA USA
Joined May 2009
Don't wanna be here? Send us removal request.
@steve_hanna
Steve Hanna
8 years
To see how @JuniperNetworks is using the @Infineon OPTIGA TPM to secure their routers, come see our demo in booth 6C41 at #MWC2018.
0
4
8
@steve_hanna
Steve Hanna
10 years
Yeah, Harvard has some weird IoT things: robots, buildings, labs, etc. Glad I could help them with #IoT #security today.
0
2
7
@steve_hanna
Steve Hanna
10 years
Talking to Harvard's sysadmins about #IoT #security on Thursday. I bet they have some odd things hooked up to their networks!
0
1
2
@steve_hanna
Steve Hanna
10 years
A6a For legacy systems, layer security on top. See TCG @TrustedComputin Architect’s Guide: https://t.co/IvHczBkTaT #IICSecurity #IoTSecurity
0
3
2
@steve_hanna
Steve Hanna
10 years
A6 To check your system's security, hire an outsider to review it. https://t.co/ZL7yYDhuNU #IICSecurity #ISPN #IoTSecurity
0
3
2
@steve_hanna
Steve Hanna
10 years
A5 Security functions for industrial IoT? See the list at https://t.co/i3AZXRn9Tn #IICSecurity #IoTSecurity #Infineon
0
3
3
@steve_hanna
Steve Hanna
10 years
A4 Interoperability is key for maximizing value while minimizing cost. #IICSecurity #IoTSecurity #Infineon
0
1
2
@steve_hanna
Steve Hanna
10 years
A4 Kerckhoffs’s Principle says that security by obscurity doesn't work. Properly designed open systems are more secure. #IICSecurity
0
5
7
@steve_hanna
Steve Hanna
10 years
A4 Open standards for security? Yes. Two reasons: Kerckhoffs’s Principle and interoperability. #IICSecurity #IoTSecurity #Infineon
0
5
4
@steve_hanna
Steve Hanna
10 years
A3 Industrial Internet benefits > risks? Yes, if you secure things properly. No, otherwise. #IICSecurity #IoTSecurity #Infineon
0
3
4
@steve_hanna
Steve Hanna
10 years
A2 Intentional threats need stronger measures: cryptography and built-in hardware security. #TPM #IICSecurity #IoTSecurity
0
3
5
@steve_hanna
Steve Hanna
10 years
A2 #IICSecurity Unintentional threats require easy but strong user authentication for significant actions #IoTSecurity @FIDOalliance
0
2
2
@steve_hanna
Steve Hanna
10 years
A2 #IICSecurity Unintentional threats are common but often ignored. Example? Olympic Pipeline Explosion https://t.co/arNa5VlDXW #IoTSecurity
0
3
5
@steve_hanna
Steve Hanna
11 years
A4: For manufacturing security, check out the talk I'm giving today at #iotasia http://t.co/LBOCOQVls7  #IIC24 #IoTDay
1
0
1
@steve_hanna
Steve Hanna
16 years
Heard about the TPM hack? See the TCG response at http://bit.ly/anKPfS Explains why you shouldn't worry
0
0
0
@steve_hanna
Steve Hanna
16 years
Stretching Memorial Day into a weeklong vacation!
0
0
0
@steve_hanna
Steve Hanna
17 years
Thinking deep thoughts
0
0
0