-
Podcast May 28, 2020
Root Causes 95: Cryptographic Key Vaulting
For PKI to be secure, private keys need to remain private. In this episode we explain "vaulting" for keys or other shared secrets.
-
Podcast May 26, 2020
Root Causes 94: Revocation Checking Through OCSP and CRL
One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.
-
Podcast May 21, 2020
Root Causes 93: Videoconferencing Phishing
With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.
-
Podcast May 18, 2020
Root Causes 92: COVID-19 Immunity Passports
As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic "immunity passport" that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection). Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.
-
Podcast May 13, 2020
Root Causes 91: Rabobank Banking App Outage
"Zero Trust" is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization's environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.
-
Podcast May 11, 2020
Root Causes 90: An Analysis of Distributed PKI
Advocates of distributed PKI say it will eliminate weaknesses in traditional, hierarchical PKI. In this episode we test if these claims to see hold up.
-
Podcast May 07, 2020
Root Causes 89: PKI's Role in Zero Trust
"Zero Trust" maximizes protection from threats by controlling permissions for every individual, device, and process in the organization's environment.
-
Webinar May 04, 2020
Using PKI for Business Continuity and the Secure Remote Workforce
Join Jason Soroko and Tim Callan, as they discuss the effects of the current pandemic on IT operations and the key role PKI plays.
-
Podcast May 04, 2020
Root Causes 88: PKI and Blockchain
Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain.
-
Podcast Apr 30, 2020
Root Causes 87: Zoom's (Not) End-to-End Encryption
With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology.
-
Podcast Apr 27, 2020
Root Causes 86: SSH Keys
SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon.
-
Podcast Apr 23, 2020
Root Causes 85: Automotive Key Fobs and Cryptography
Attacks compromising our cars' key fobs could be highly damaging. Join us to learn about the cryptographic architecture of a modern automotive key fob.