Tim Callan has over 20 years of experience in the SSL and PKI technology spaces. Tim leads Sectigo's conformance with industry and regulatory requirements including browser root programs, WebTrust, CA/Browser Forum, and more. Tim is instrumental in driving initiatives to improve certificate agility and successful issuance. A founding member of the CA/Browser Forum and current vice-chair for one of its working groups, Tim is creator and co-host of Root Causes: A PKI and Security Podcast, the world’s most popular podcast dedicated to digital certificates. With 400+ episodes published, Tim is on the forefront of explaining trends that will be essential to the IT professionals, including shortening certificate lifespans and the coming change to post-quantum cryptography.
Webinar
Dec 03, 2024
Today’s encrypted data are tomorrow’s exposed secrets. Quantum computing represents a paradigm shift not just in computational power, but in the fundamental security…
Webinar
Nov 21, 2024
Join us for our quarterly Sectigo Pulse webinar, where we cover the latest product & compliance news & how these events might impact you & your business.
Podcast
Nov 18, 2024
We talk about public key directories and complicating factors such as Tailscale, VPN, TOR, Cloudflare, and Zero Trust.
Podcast
Nov 15, 2024
NIST has narrowed its PQC onramp contest to 15 candidates. We go over who remains and the makeup of the remaining candidates.
Podcast
Nov 12, 2024
Repeat guest Bruno Couillard argues that cryptography is foundational to our lives and that the transition to PQC is an existential requirement.
Webinar
Oct 31, 2024
Join us for our quarterly Sectigo Pulse webinar, where we cover the latest product and compliance news and how these events might impact your business.
Podcast
Oct 29, 2024
Formal proofs are critical to cryptography. We discuss how better processes and AI can accelerate formal proofs of cryptographic concepts.
Podcast
Oct 25, 2024
We explain how radically oversimplified the concept of PQC "Q day" really is.
Podcast
Oct 22, 2024
Reports suggest Chinese researchers used a quantum annealing computer to break AES. We clarify the findings and discuss the potential implications.