-
Podcast Feb 24, 2022
Root Causes 208: HD Radio Error Bricks Automotive Information Systems
Recently automobile infotainment systems were permanently "bricked" by a HD radio flaw. Our hosts describe what happened and the lessons we can learn.
-
Podcast Feb 21, 2022
Root Causes 207: Former Gartner Analyst Jumps on the Playing Field
Gartner analyst David Mahdi explains the reasons for his optimism about digital trust, including NFTs, Web3, blockchain, PKI, and Zero Trust.
-
Podcast Feb 14, 2022
Root Causes 206: What Is Web3?
Web3 refers to the concept that online content can be attributed to specific known publishers, regardless of web site or online channel.
-
Podcast Feb 09, 2022
Root Causes 205: Anatomy of an Encrypted Peer-to-Peer Mesh Network
Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.
-
Podcast Feb 02, 2022
Root Causes 204: PKI's Role in Passwordless
We explain PKI's specific role in passwordless authentication, clarifying the difference between password-masking and true passwordless technologies.
-
Podcast Jan 31, 2022
Root Causes 203: What Is a Credential Vault?
Credential vaults are necessary for secure and functional secrets management for automated systems like DevOps or Robotic Process Automation (RPA).
-
Podcast Jan 27, 2022
Root Causes 202 : What Is Certificate Transparency?
Certificate Transparency (CT) is essential to monitoring the public SSL certificates that are issued. We explain CT logs and the uses we can put them to.
-
Podcast Jan 24, 2022
Root Causes 201: What Are the Baseline Requirements?
The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. We explain them and why they matter.
-
Webinar Jan 20, 2022
15 Security Fallacies We Still Face in 2022
A VPN is not a security tool! It's in the name. This is just one of the many security misconceptions that people still continue to believe in 2022. There is a lot of misinformation surrounding information security and it only makes our jobs harder when protecting sensitive data. In this webinar, Sectigo’s Jason Soroko and Greg Mooney discuss the top security fallacies and some tips on ways to avoid them.
-
Podcast Jan 19, 2022
Root Causes 200: Why Not to Copy and Paste Commands from Web Pages
This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack.
-
Podcast Jan 14, 2022
Root Causes 199: What Is Privileged Access Management?
We explain Privileged Access Management (PAM). We go on to explain some of the ways that networks are still vulnerable to attack and what to do about it.
-
Podcast Jan 11, 2022
Root Causes 198: Deep Voice Fakes
Our hosts explore deep voice fakes, computer generated audio that successfully passes for the voice of a known associate, and the risks they pose.