-
Listen Now
EPISODE 487
Broadcast Date:
April 17, 202546 minutes
Podcast Apr 17, 2025Root Causes 487: Security 2030
Jason and I take a peek forward at what we imagine IT security looks like in 2030. Topics include PQC, ZTNA, "green zones," deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.
-
Listen Now
EPISODE 483
Broadcast Date:
April 7, 202523 minutes
Podcast Apr 07, 2025Root Causes 483: Introducing the PQC Sandbox
We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo's new post quantum cryptography (PQC) sandbox. The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.
-
Learn More
How timing attacks threaten postquantum cryptography
Blog Post from Sectigo
Blog Post Apr 03, 2025Post-quantum cryptography is designed to resist quantum threats, but timing attacks expose new risks. Discover how these attacks work & how to stop them.
-
Listen Now
EPISODE 482
Broadcast Date:
April 2, 202515 minutes
Podcast Apr 02, 2025Root Causes 482: Microsoft and PQC
In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA. We discuss potential paths for Microsoft to take and their consequences.
-
Listen Now
EPISODE 481
Broadcast Date:
March 31, 202512 minutes
Podcast Mar 31, 2025Root Causes 481: What Is Protocol Ossification?
Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol. This occurs when individual software components only partially support the capabilities that should be available. We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.
-
Listen Now
EPISODE 480
Broadcast Date:
March 24, 202510 minutes
Podcast Mar 24, 2025Root Causes 480: White House PQC Executive Order
Many people believe that the Trump White House rescinded an important cybersecurity executive order from late days of the Biden administration. We set the record straight.
-
Learn More
Why you need a crypto center of excellence today
Blog Post from Sectigo
Blog Post Mar 06, 2025A CryptoCOE standardizes encryption, enhances security, and prepares businesses for quantum threats with centralized cryptographic governance.
-
Listen Now
EPISODE 474
Broadcast Date:
March 3, 202520 minutes
Podcast Mar 03, 2025Root Causes 474: Explaining Shor's Algorithm
We talk a lot about Shor's Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor's algorithm for non-quantum physicists.
-
Listen Now
EPISODE 471
Broadcast Date:
February 24, 202521 minutes
Podcast Feb 24, 2025Root Causes 471: ACME for PQC
In this episode, guest Alexandre Giron explains what is needed to support pos quantum cryptography (PQC) with ACME.
-
Learn More
Sectigo unveils Sectigo PQC Labs, the industry’s first postquantum cryptographic sandbox to meet NIST’s full PQC standards
Press Release from Sectigo
Press Release Feb 06, 2025SCOTTSDALE, Ariz., — February 6, 2025 — Sectigo, a global leader in digital certificates and Certificate Lifecycle Management (CLM), today announced the launch of Sectigo PQC Labs, a platform collaboration with Crypto4A, the industry’s first provider of quantum-safe Hardware Security Modules (HSMs). Backed by the only HSM meeting NIST’s full postquantum standards, Sectigo PQC Labs addresses today's urgent need for a quantum-safe, practical and scalable platform to test, validate and support an organization’s safe transition to quantum-resistant cryptography.
-
Listen Now
EPISODE 464
Broadcast Date:
February 5, 202519 minutes
Podcast Feb 05, 2025Root Causes 464: Defending Against Harvest and Decrypt
Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.
-
Learn More
2025 tech predictions: Quantum leap & security shifts
Blog Post from Sectigo
Blog Post Jan 31, 20252025 will see a shift in security: legacy tech declines, TLS lifespans shorten, and revocation rules tighten. Adaptation is key to staying ahead.