-
Podcast Jun 30, 2022
Root Causes 230: What Is Apple Passkey?
Apple recently announced its Passkey functionality, which will allow passwordless authentication with supporting web services through key exchange.
-
Podcast Jun 08, 2022
Root Causes 229: Browsing Collectives and the 80/20 Rule of Privacy
In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy.
-
Podcast Jun 01, 2022
Root Causes 228: Getting the FLoC out of Here
We discuss Google's Federated Learning of Cohorts (FLoC) initiative, why it failed, and other privacy directions the industry is looking in.
-
Podcast May 27, 2022
Root Causes 227: Let's Talk About Cookies
We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.
-
Podcast May 24, 2022
Root Causes 226: The Six Benefits of SSH Certificates
We identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.
-
Podcast May 20, 2022
Root Causes 225: Relying Parties Versus Certificate Consumers
We define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.
-
Podcast May 17, 2022
Root Causes 224: The Five Problems with SSH Keys
We discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.
-
Podcast May 13, 2022
Root Causes 223: CT Log-Enabled Attacks on WordPress Sites
Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.
-
Podcast May 11, 2022
Root Causes 222: Consolidation and PKI Solutions
Vendor consolidation is an important topic in IT security. In this episode we discuss this trend and how it affects PKI and digital certificates.
-
Blog Post May 09, 2022
In a world where many different users, mobile devices, and automated processes need to access networked resources, passwords are no longer an effective method to authenticate every single identity in an organization. Sophisticated attacks like phishing, keyloggers, and brute force cracking are highly capable of stealing passwords. Overall, this creates a very real scenario where passwords have become an outdated form of authentication with weak security, bad user experience, and added helpdesk burden all rolled into one.
-
Podcast May 05, 2022
Root Causes 221: What Are SSH Keys?
SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. We explain what these keys are and how they're used.
-
Podcast May 02, 2022
Root Causes 220: The Difference Between OTP and Passwordless
In this episode we clarify the difference between OTP services and passwordless authentication.