-
Podcast Nov 19, 2020
Root Causes 129: Examining MFA Through Hard Tokens
Hard tokens are an old multi-factor authentication (MFA) form factor, still in use today. We examine the strengths and weaknesses of hard tokens.
-
Blog Post Nov 13, 2020
Any digital certificate that authenticates the identity of a website carries risk. There is risk that its private key has been secretly stolen, or that a heretofore unknown technique will render its cryptography insecure. There is risk that the domain has changed ownership since the certificate was issued, or that an undiscovered flaw in the requesting operating system has rendered its key predictable. There could even be a massive, brute force attack against its key underway right now.
-
Podcast Nov 12, 2020
Root Causes 128: What Is Total Certificate Agility?
Certificate agility refers to building our systems so that all certificates are known, current, and immediately replaceable.
-
Podcast Nov 05, 2020
Root Causes 127: What a Chief Compliance Officer at a Public CA Does
Our hosts discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.
-
Podcast Oct 28, 2020
Root Causes 126: IoT Ransomware
New research shows how ransomware attacks could be launched against IoT devices. Understand these attacks and what can be done to defend against them.
-
Webinar Oct 15, 2020
21 PKI Pitfalls to Avoid Webinar
Join Sectigo Senior Fellow Tim Callan and CTO of PKI Jason Soroko as they detail the twenty-one pitfalls so you can be on the lookout for them.
-
Podcast Oct 08, 2020
Root Causes 125: Digital Identity Versus IAM
Certificate-based digital identity and Identity and Access Management (IAM) platforms are entirely different things. How do they fit in with each other?
-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
-
Podcast Sep 28, 2020
Root Causes 122: Passwordless Authentication for Apple OS
A discussion of passwordless authentication and access for Apple platforms (with Joel Rennich of Jamf).
-
Blog Post Sep 24, 2020
SSH keys not only improve security but also enable the automation of connected processes, single sign-on (SSO), and identity and access management at scale that today’s businesses require.
-
Webinar Sep 24, 2020
Q3 Sectigo Pulse Webinar
Join us for our quarterly Sectigo Pulse webinar, where we'll cover the latest product and compliance news, and how they might impact you and your business.