-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
-
Podcast Sep 14, 2020
Root Causes 119: What Is Crypto Agility?
Learn why crypto agility is more important than ever, why the pace of cryptographic change is going up, and you can do to improve crypto agility.
-
Blog Post Aug 04, 2020
The fundamental cryptographic algorithms now used to protect every facet of digital life will, within several years, be defeated by quantum computers.
-
Podcast Jun 26, 2020
Root Causes 102: Lawful Access to Encrypted Data Act
A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act is discussed in this week's episode.
-
Podcast Jun 21, 2020
Root Causes 101: Google RCS Chat with End-to-End Encryption
Google has just announced the coming availability of end-to-end encryption for its chat service.
-
News Article Jun 12, 2020
Secure means nothing more than communication with a website is encrypted.
-
Podcast Jun 01, 2020
Root Causes 96: Signal May Leave USA to Protect End-to-End Encryption
Congress's proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication.
-
Podcast Apr 30, 2020
Root Causes 87: Zoom's (Not) End-to-End Encryption
With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology.
-
News Article Apr 16, 2020
Zoom is making rapid security changes after being banned from a number of high-profile businesses including Siemens, SpaceX and Standard Chartered following high-profile criticism from the InfoSec community. Where does this leave Zoom and what can other businesses learn from its meteoric rise in popularity exposing weaknesses?
-
Podcast Apr 16, 2020
Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date?
Our hosts debate if and how the pandemic's disruptive nature might change the date on which quantum computers are able to defeat today's encryption.
-
Blog Post Mar 24, 2020
Automotive key fobs are an attractive target for hackers. Sectigo explains why & how car key fob security can improve with the right encryption & software.
-
Podcast Feb 24, 2020
Root Causes 68: Why SHA-1 Is No Longer Secure
SHA-1 was a cornerstone of the early secure web. 25 years later this hashing function is no longer secure. Join our hosts to hear the history of SHA-1.