-
Learn More
Root Causes Nominated “Webby Honoree” at 2023 Webby Awards
Blog Post from Sectigo
Blog Post Apr 05, 2023January 4, 2019. This was the date of the inaugural episode of Root Causes – the first ever podcast dedicated to the changing and critically important world of PKI and digital certificates. Since its inception, Root Causes has fostered stimulating, timely conversation and commentary around major trends impacting the cybersecurity industry.
This week, on April 4, 2023, Root Causes received its first, major award, as a ‘Webby Honoree’ at the 2023 Webby Awards. To say that this is thrilling is an understatement. Since 2019, Jason and I have singlehandedly recorded and produced nearly 300 episodes of Root Causes, and it goes without saying we are honoured to receive this accolade.
In the first ever episode of Root Causes, Jason and I laid our mission for the podcast. We would “nerd out” together on various deep topics about security, digital identity, encryption, and the like. We decided it might be valuable to capture our discussions for posterity. There are many interesting topics that result from the resurgence of PKI. The concept of establishing a strong sense of public and private trust has never been more important for enterprises than it is now. Additionally, the world of PKI is a big place - there are a LOT of non-obvious concepts that can benefit from discussion. Root Causes is our way of capturing these ideas and exploring ways in which organizations can establish digital trust with PKI and digital certificates.
Since 2019, Root Causes has grown steadily. In August 2020, we celebrated our one hundredth episode. Less than a year later, in April 2021, we celebrated 40,000 listens of our podcast. By September 2021, this number had reached 50,000 and by November 2022, we’d reached 150,000 listens. This month we expect to hit a quarter million listens.
Jason and I view this growing audience as validation that our industry it important to a large number of IT professionals. We feel privileged that our podcast can be a meaningful contributor to discussion of this industry.
For those of you that may be unaware, The Webby Awards are major. Earning the distinction of Webby Honoree, as recognized by the International Academy of Digital Arts & Sciences is a significant achievement—granted to only the top 20% of all work entered in the 27th Annual Webby Awards. Looking at those also in our category of “Technology Podcasts,” Root Causes is keeping some impressive company alongside podcasts produced by major technology media outlets such as TechCrunch and The Verge, along with Mozilla’s own podcast. Of course, we wish those nominated for the Webby People’s Voice the very best of luck.
We also want to thank our listeners. Root Causes is for you, so thank you for listening. Finally, for those of you uninitiated to Root Causes, here are some recommendations to get you started.
Episode 1 – The Intro - Meet your hosts Tim Callan and Jason Soroko and learn why we decided to start the Root Causes podcast.
Episode 235 – The Listener’s Favorite - Our most downloaded episode of the past year explores lattice-based encryption, the algorithmic foundation of new post-quantum cryptography (PQC) standards.
Episode 284 – The Trending Topic - Learn about Google's plan to reduce maximum TLS validity to 90 days.Thanks for joining us on Root Causes. Most weeks we post two episodes, so we hope you join us again soon.
-
Learn More
Google announces intentions to limit TLS certificates to 90 days: Why automated CLM is crucial
Blog Post from Sectigo
Blog Post Mar 13, 2023On March 3, Google announced in its “Moving Forward, Together” roadmap the intention to reduce the maximum possible validity for public TLS certificates from 398 days to 90 days, in a future policy update or a CA/B Forum Ballot Proposal. This drop to only 90 days maximum validity will mean major changes for the industry.
-
Learn More
How to Achieve Complete Visibility Across All Cryptographic Assets
Blog Post from Sectigo
Blog Post Mar 01, 2023Digital certificates underpin all industries and secure an almost limitless number of systems and processes. They allow humans and machines, whether a humble printer in the corner of a home office or sophisticated IoT devices in a factory, to verify their digital identities and establish digital trust as they’re interacting with other humans, machines or digital services.
-
Learn More
Does Your CLM Integrate with Your Tech Stack? Here’s Why It Should
Blog Post from Sectigo
Blog Post Feb 15, 2023The challenges enterprise IT security teams face today are nothing like they were five years ago. Today enterprises face globally distributed networks of bad actors that wield increasingly sophisticated technological and social tools, designed to infiltrate secure systems and exploit identity-based vulnerabilities.
-
Learn More
6 Reasons Why CA Agnostic CLM Is Vital
Blog Post from Sectigo
Blog Post Feb 06, 2023Digital trust is the foundation for secure business operations. This requires establishing and maintaining a strong cryptographic identity for every single user and machine (i.e. software, hardware, device, container, bot, etc.) attempting to access a network so the enterprise can verify who, or what, is interacting with its system.
-
Learn More
Sectigo Announces Further Advancements to Industry-Leading CLM Platform
Blog Post from Sectigo
Blog Post Jan 30, 2023Certificate Lifecycle Management (CLM) is increasingly becoming mission-critical for IT leaders as they work to establish digital trust for their enterprises in remote and hybrid work environments. CISOs and their teams must acquire and manage multiple, expensive, and siloed public key infrastructure and CLM solutions to tackle human and machine identity management.
-
Learn More
An Exciting Development in Quantum-Safe Cryptography: ISARA Dedicates Four Digital Certificate Patents to the Public
Blog Post from Sectigo
Blog Post Dec 02, 2022Quantum computing will render traditional public key infrastructure (PKI), as the world knows it, no longer fit for purpose in the coming years. This poses a very real threat to the information security systems enterprises rely on to protect freedom, liberty, privacy, and security.
-
Learn More
MFA Fatigue: Rethinking How Enterprises Authenticate
Blog Post from Sectigo
Blog Post Nov 21, 2022Not all forms of multi-factor authentication (MFA) are created equal and the forms that are based on one-time passcodes have turned into corporate liabilities. One-time passcodes that are entered into malicious login pages or entered into a compromised endpoint can be harvested by an attacker and utilized to log in along with a harvested username and password.
-
Learn More
OpenSSL Vulnerability Patch Released
Blog Post from Sectigo
Blog Post Nov 01, 2022The OpenSSL Project team has released the patch for a significant security vulnerability identified within version 3 of the OpenSSL library.
-
Learn More
Why Crypto Agility Is Crucial to Navigating Quantum Computing
Blog Post from Sectigo
Blog Post Sep 19, 2022Today the world’s data is secured with technology that in some ways acts like a passport. Like passports, this technology – a public key infrastructure (PKI) digital certificate – contains identity information related to the holder. In the digital world, digital certificates act as a “passport” for humans and the machines (such as software, code, bots, IoT/OT, laptops, and devices) they use.
-
Learn More
NIST's official 2024 post-quantum algorithms
Blog Post from Sectigo
Blog Post Sep 12, 2022Quantum computing’s arrival will cause a ripple effect touching every corner of the technological landscape. In general terms, quantum computers lean on quantum physics to run multiple processes simultaneously, allowing them to solve certain complex problems much more quickly than traditional computers can today.
-
Learn More
5 Ways to Prepare Now for Quantum Computing
Blog Post from Sectigo
Blog Post Sep 06, 2022For nearly 50 years, public key infrastructure (PKI) has provided a secure cryptographic foundation for the world’s data. But in the next few years, quantum computers are destined to render the current cryptographic algorithms that secure devices and the people who use them obsolete.