Resource Library

We encourage you to use the search feature and filters on the left side of the screen to locate specific resources of interest (search by organization, author, keyword, etc.).
Root Causes 1-09: 63-bit Serial Numbers Podcast

Root Causes 1-09: 63-bit Serial Numbers

A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements. Learn how it's that 64-bit certificate serial numbers might offer only 63 bits of entropy.
Root Causes 1-02: O2 Outage and Equifax Breach Podcast

Root Causes 1-02: O2 Outage and Equifax Breach

In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach.
Root Causes 1-03: US Government Shutdown and Security Vulnerabilities Podcast

Root Causes 1-03: US Government Shutdown and Security Vulnerabilities

The US government shutdown has taken its toll on IT systems. Services are going offline, and we are ill equipped to deal with a major security or service crisis. Tune in to learn more.
Root Causes 1-04: Australia's New IT Security Back Door Podcast

Root Causes 1-04: Australia's New IT Security Back Door

Australia now requires a back door to IT systems. Our hosts are skeptical that this idea will work. Join our PKI experts to learn about the dangers and pitfalls of such a system - and why they have failed in the past.
Root Causes 1-05: Cryptographic Quantum Apocalypse Podcast

Root Causes 1-05: Cryptographic Quantum Apocalypse

As quantum computing continues to progress, the world's widespread cryptographic schemes are in danger. To prepare for the cryptographic "Quantum Apocalypse" we will need to replace our RSA- and ECC-based schemes with a new set of ciphers.
Root Causes 1-06: Quantum-Resistant Cryptography Podcast

Root Causes 1-06: Quantum-Resistant Cryptography

The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more.
Root Causes 1-07: Russian Disconnection from the Internet Podcast

Root Causes 1-07: Russian Disconnection from the Internet

Russia has stated that it will disconnect from the internet as a trial exercise for full-blown cyber warfare. Join us to learn some of the problems facing Russia will face if indeed it disconnects.
Root Causes 1-08: Free PKI Is Not Free Podcast

Root Causes 1-08: Free PKI Is Not Free

The promise of a "free" Microsoft CA was alluring to enterprises in the 2000s, but today's increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA.
Root Causes 1-10: S/MIME Automated Deployment Podcast

Root Causes 1-10: S/MIME Automated Deployment

S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments; providing strong defenses against a variety of email-based attacks, yet adoption today is extremely small.
Root Causes 1-11: Authentication Is Not for the Authenticated Podcast

Root Causes 1-11: Authentication Is Not for the Authenticated

Join us for a discussion of who benefits from known identity, what can go wrong when identity is obscured, and why ecosystems must include incentives for members to participate in identity authentication.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361