-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
-
Podcast Sep 28, 2020
Root Causes 122: Passwordless Authentication for Apple OS
A discussion of passwordless authentication and access for Apple platforms (with Joel Rennich of Jamf).
-
Podcast Sep 21, 2020
Root Causes 121: What Is a Hardware Security Module?
Our hosts explain terms like Hardware Security Module (HSM), Trusted Platform Module (TPM), Secure Enclave, TrustZone, and Hardware Secure Element (SE).
-
Podcast Sep 18, 2020
Root Causes 120: PKI and SASE
How do digital identity and certificates fit into the SASE (Secure Access Service Edge) paradigm?
-
Podcast Sep 14, 2020
Root Causes 119: What Is Crypto Agility?
Learn why crypto agility is more important than ever, why the pace of cryptographic change is going up, and you can do to improve crypto agility.
-
Podcast Sep 08, 2020
Root Causes 118: Quantum Apocalypse - What Is a Hybrid Certificate?
Sectigo's Quantum Safe Kit enables hybrid TLS certificates. Find out how hybrid certificates are essential to transitioning to quantum-safe crypto.
-
Podcast Sep 04, 2020
Root Causes 117: Why Default Deny Matters to the CA/Browser Forum
CABF has been discussing "default deny," an approach to ambiguities in existing guidelines, with significant impact on how to interpret the rules.
-
Podcast Aug 31, 2020
Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT
Ripple20 is a set of vulnerabilities in the early Treck TCP/IP stack, a popular IoT choice. Learn their significance and how we can avoid these problems.
-
Podcast Aug 27, 2020
Root Causes 115: Signed HTTP Exchange (SXG) Certificates
SXG certificates enable the display of AMP pages with the original publisher's authenticated URL in the mobile reader.
-
Podcast Aug 21, 2020
Root Causes 114: Is Quantum Computing a Threat to SHA-2?
Do quantum computers threaten SHA-2 and other hashing algorithms? Our hosts discuss the difference between Shor's Algorithms and Grover's Algorithm.
-
Podcast Aug 18, 2020
Root Causes 113: What Is Certificate Pinning?
Though once considered a legitimate security option, certificate pinning is widely discredited for its certificate agility costs.