-
Podcast Jul 22, 2022
Root Causes 234: Report from the 2022 RSA Conference
The RSA Security Conference is back. We talk about 2020 and how the first post-COVID RSAC compared to earlier years, plus major themes this year.
-
Podcast Jul 13, 2022
Root Causes 233: CISA Recommendations for Post-Quantum Cryptography
The Cybersecurity and Infrastructure Security Agency has listed six key actions for IT to commence for post-quantum cryptography. We put them in context.
-
Podcast Jul 08, 2022
Root Causes 232: NIST Announces Its Post Quantum Crypto Selections
NIST has announced its winning algorithms for its post-quantum cryptography contest. We name describe them, why they were chosen, and next steps.
-
Podcast Jul 06, 2022
Root Causes 231: What Is FIDO?
We explain device-centric authentication, the FIDO Alliance, WebAuthn, and how it all works.
-
Podcast Jun 30, 2022
Root Causes 230: What Is Apple Passkey?
Apple recently announced its Passkey functionality, which will allow passwordless authentication with supporting web services through key exchange.
-
Podcast Jun 08, 2022
Root Causes 229: Browsing Collectives and the 80/20 Rule of Privacy
In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy.
-
Podcast Jun 01, 2022
Root Causes 228: Getting the FLoC out of Here
We discuss Google's Federated Learning of Cohorts (FLoC) initiative, why it failed, and other privacy directions the industry is looking in.
-
Podcast May 27, 2022
Root Causes 227: Let's Talk About Cookies
We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.
-
Podcast May 24, 2022
Root Causes 226: The Six Benefits of SSH Certificates
We identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.
-
Podcast May 20, 2022
Root Causes 225: Relying Parties Versus Certificate Consumers
We define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.
-
Podcast May 17, 2022
Root Causes 224: The Five Problems with SSH Keys
We discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.
-
Podcast May 13, 2022
Root Causes 223: CT Log-Enabled Attacks on WordPress Sites
Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.