Tim Callan has over 20 years of experience in the SSL and PKI technology spaces. Tim leads Sectigo's conformance with industry and regulatory requirements including browser root programs, WebTrust, CA/Browser Forum, and more. Tim is instrumental in driving initiatives to improve certificate agility and successful issuance. A founding member of the CA/Browser Forum and current vice-chair for one of its working groups, Tim is creator and co-host of Root Causes: A PKI and Security Podcast, the world’s most popular podcast dedicated to digital certificates. With 400+ episodes published, Tim is on the forefront of explaining trends that will be essential to the IT professionals, including shortening certificate lifespans and the coming change to post-quantum cryptography.
Webinar
Jan 13, 2025
Prepare for 2025 PKI challenges: Quantum threats, TLS changes, and automation trends to boost crypto-agility and overcome IT resource limits.
Podcast
Dec 18, 2024
Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module (HSM).
Podcast
Dec 17, 2024
We go over Tim's September 2024 keynote speech at ENISA CA Day, "The Privilege of Being a Public CA."
Podcast
Dec 13, 2024
As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035. We get into…
Podcast
Dec 12, 2024
Tim has stepped into the position of vice-chair of the CA/Browse Forum, and Sectigo now holds five chair or vice-chair positions in that body. We explain how leadership…
Podcast
Dec 09, 2024
We take a deep dive into the seven reasons shorter certificate lifespans are better.
Podcast
Dec 05, 2024
We discuss how a potential break of Chrome from Google would affect the WebPKI. We look at product changes, resourcing, post-quantum cryptography (PQC), innovation,…
Podcast
Dec 02, 2024
In this episode we discuss the challenges for enterprises using Microsoft Active Directory Certificate Services (ADCS).
Podcast
Nov 25, 2024
Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final term of 47 rather than 45 days.