-
Podcast Mar 04, 2020
Root Causes 70: Identity Is the New Perimeter
Modern processes have shattered the old concept of an enterprise IT perimeter. In this episode our hosts discuss various identity schemes and challenges.
-
Blog Post Mar 02, 2020
Let's Encrypt has issued millions of certificates without proper CAA checks. LE multi-domain cert users should assume they're affected.
-
Podcast Feb 28, 2020
Root Causes 69: Fundamentals of DevOps and PKI
In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI.
-
Podcast Feb 24, 2020
Root Causes 68: Why SHA-1 Is No Longer Secure
SHA-1 was a cornerstone of the early secure web. 25 years later this hashing function is no longer secure. Join our hosts to hear the history of SHA-1.
-
Podcast Feb 21, 2020
Root Causes 67: Definition of DevOps and DevSecOps
What does DevOps mean in today's enterprise. We explore cultural implications, "configuration drift," definition of release velocity, and DevSecOps.
-
Podcast Feb 18, 2020
Root Causes 66: Functional Versus Homomorphic Encryption
Homomorphic encryption allows select data to be gleaned from a file even while it remains encrypted. Learn about this approach and its implications.
-
Podcast Feb 10, 2020
Root Causes 65: Quantum Key Distribution
Join us as we explain how quantum key distribution works, why it is not the same as quantum safe cryptography, and which cases it may be useful for.
-
Podcast Feb 04, 2020
Root Causes 64: What Is Digital Identity?
The phrase "identity is the new perimeter" has gained in use, but what do we mean when we say identity?
-
Podcast Jan 29, 2020
Root Causes 63: What Is CAA?
CA Authentication gives domain owners the ability to specify in DNS which CAs are allowed to issue SSL certificates for a domain. Join us to learn more.
-
Podcast Jan 22, 2020
Root Causes 62: Windows CryptoAPI Spoofing Vulnerability Explained
A new Windows vulnerability allows creation of fake certificates on trusted roots. This episode explains possible exploits and what to do about them.
-
Webinar Jan 16, 2020
CA SB-327: The Nation's First IoT Cybersecurity Law
Join Jason Soroko and Tim Callan as they walk you through the new law, CA SB-327, what it requires from IoT providers, and how you can stay compliant.
-
Podcast Jan 10, 2020
Root Causes 61: Anatomy of a Cryptocurrency
In this episode we discuss the technology and ecosystem of cryptocurrencies, including blockchain and PKI.