Contact Us

Resource Library

We encourage you to use the search feature and filters on the left side of the screen to locate specific resources of interest (search by organization, author, keyword, etc.).
Found 51 resources of type Podcast
Root Causes 1-41: What Is Blockchain's Killer App? Podcast

Root Causes 1-41: What Is Blockchain's Killer App?

Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. Join us as we explain what blockchain actually does and how it compares to PKI.
Root Causes 1-39: New University Research on Phishing and Certificates Podcast

Root Causes 1-39: New University Research on Phishing and Certificates

The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a German technical university, investigates the patterns behind this certificate usage.
Root Causes 1 - 38 - Interesting Breaches In August Mixdown Podcast

Root Causes 1 - 38 - Interesting Breaches In August Mixdown

The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, and some interesting developments with malware-driven botnets.
Root Causes 1 - 37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography? Podcast

Root Causes 1 - 37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography?

Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto

Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community.
Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks Podcast

Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks

Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have?
Root Causes 1 - 34: Shadow IT and PKI Podcast

Root Causes 1 - 34: Shadow IT and PKI

Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO's ability to oversee and control the enterprise's technology systems.
Root Causes 1 - 33: Prepare for One-Year Limits on SSL Certificates Podcast

Root Causes 1 - 33: Prepare for One-Year Limits on SSL Certificates

The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration.
Root Causes 1 - 32: Why Do Browsers and Academic Research Say Different Things About EV SSL? Podcast

Root Causes 1 - 32: Why Do Browsers and Academic Research Say Different Things About EV SSL?

Few people know that caller ID numbers have no idBreaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing.
Root Causes 1 - 31: Using PKI to Authenticate Phone Callers Podcast

Root Causes 1 - 31: Using PKI to Authenticate Phone Callers

Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts today.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361