-
Podcast Nov 24, 2020
Root Causes 130: How to Get Rid of Password Breaches
We discuss the weaknesses of passwords and why they nonetheless are still common. We describe the roadmap for weeding out passwords from most systems.
-
Podcast Nov 19, 2020
Root Causes 129: Examining MFA Through Hard Tokens
Hard tokens are an old multi-factor authentication (MFA) form factor, still in use today. We examine the strengths and weaknesses of hard tokens.
-
Podcast Nov 12, 2020
Root Causes 128: What Is Total Certificate Agility?
Certificate agility refers to building our systems so that all certificates are known, current, and immediately replaceable.
-
Podcast Nov 05, 2020
Root Causes 127: What a Chief Compliance Officer at a Public CA Does
Our hosts discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.
-
Podcast Oct 28, 2020
Root Causes 126: IoT Ransomware
New research shows how ransomware attacks could be launched against IoT devices. Understand these attacks and what can be done to defend against them.
-
Webinar Oct 15, 2020
21 PKI Pitfalls to Avoid Webinar
Join Sectigo Senior Fellow Tim Callan and CTO of PKI Jason Soroko as they detail the twenty-one pitfalls so you can be on the lookout for them.
-
Podcast Oct 08, 2020
Root Causes 125: Digital Identity Versus IAM
Certificate-based digital identity and Identity and Access Management (IAM) platforms are entirely different things. How do they fit in with each other?
-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
-
Podcast Sep 28, 2020
Root Causes 122: Passwordless Authentication for Apple OS
A discussion of passwordless authentication and access for Apple platforms (with Joel Rennich of Jamf).
-
Podcast Sep 21, 2020
Root Causes 121: What Is a Hardware Security Module?
Our hosts explain terms like Hardware Security Module (HSM), Trusted Platform Module (TPM), Secure Enclave, TrustZone, and Hardware Secure Element (SE).
-
Podcast Sep 18, 2020
Root Causes 120: PKI and SASE
How do digital identity and certificates fit into the SASE (Secure Access Service Edge) paradigm?