-
Podcast Dec 05, 2019
Root Causes 55: California's New IoT Security Law
California Senate Bill 327 makes device security a requirement in California, setting the precedent for IoT security practices. Join us to learn more.
-
Webinar Dec 03, 2019
California Consumer Protection Act: What You Need to Know
CCPA has created consumer privacy protections for all California residents. Our experts explain these new regulations and their implications.
-
Podcast Dec 02, 2019
Root Causes 54: 2019 Lookback - Infrastructure and IoT Security
It was an eventful year for infrastructure and IoT security. Join our hosts as they discuss 2019 trends and 2020 predictions for IoT and infrastructure.
-
Podcast Nov 25, 2019
Root Causes 53: 2019 Lookback - Governments Try to Control PKI
It's been an eventful year for PKI. In this episode our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
-
Podcast Nov 22, 2019
Root Causes 52: New TLS Certificate Incident Research
Indiana University Bloomington recently published public SSL research, including methodology, incident types and causes, and rogue certificates.
-
Podcast Nov 19, 2019
Root Causes 51: Blockchain vs PKI
Join us as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.
-
Podcast Nov 08, 2019
Root Causes 50: Energy Infrastructure Cyber Attacks
Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join us to learn more.
-
Podcast Nov 06, 2019
Root Causes 49: California Consumer Privacy Act
Join us as we discuss The California Consumer Privacy Act (CCPA), what protections it provides, and what businesses must do to comply.
-
Podcast Oct 31, 2019
Root Causes 48: Weaknesses in MFA Authentication
Recent FBI warnings caution of attacks that circumvent Multi-Factor Authentication (MFA). We describe contemporary attacks and how to defend against them.
-
Podcast Oct 25, 2019
Root Causes 47: Quantum Resistant Cryptography for IoT
Our hosts explore the specific requirements and challenges for quantum resistant cryptography for IoT networks and connected devices.
-
Podcast Oct 22, 2019
Root Causes 46: Patching Browsers for TLS Fingerprinting Attacks
A Russian Advanced Persistent Threat (APT) is patching Chrome and Firefox to enable TLS fingerprinting even after its malware is removed.
-
Blog Post Oct 18, 2019
We have sought to clarify in the past that Sectigo and Comodo are entirely separate companies. Nonetheless, we have recently heard from Sectigo customers that they still listed on Comodo's customers page, despite the fact that they are not, in fact, Comodo customers. This error has led to members of the press reaching out to Sectigo customers for comment on news involving Comodo.