-
Podcast Oct 28, 2020
Root Causes 126: IoT Ransomware
New research shows how ransomware attacks could be launched against IoT devices. Understand these attacks and what can be done to defend against them.
-
Podcast Oct 08, 2020
Root Causes 125: Digital Identity Versus IAM
Certificate-based digital identity and Identity and Access Management (IAM) platforms are entirely different things. How do they fit in with each other?
-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
-
Podcast Sep 28, 2020
Root Causes 122: Passwordless Authentication for Apple OS
A discussion of passwordless authentication and access for Apple platforms (with Joel Rennich of Jamf).
-
Podcast Sep 21, 2020
Root Causes 121: What Is a Hardware Security Module?
Our hosts explain terms like Hardware Security Module (HSM), Trusted Platform Module (TPM), Secure Enclave, TrustZone, and Hardware Secure Element (SE).
-
Podcast Sep 18, 2020
Root Causes 120: PKI and SASE
How do digital identity and certificates fit into the SASE (Secure Access Service Edge) paradigm?
-
Podcast Sep 14, 2020
Root Causes 119: What Is Crypto Agility?
Learn why crypto agility is more important than ever, why the pace of cryptographic change is going up, and you can do to improve crypto agility.
-
Podcast Sep 08, 2020
Root Causes 118: Quantum Apocalypse - What Is a Hybrid Certificate?
Sectigo's Quantum Safe Kit enables hybrid TLS certificates. Find out how hybrid certificates are essential to transitioning to quantum-safe crypto.
-
Podcast Sep 04, 2020
Root Causes 117: Why Default Deny Matters to the CA/Browser Forum
CABF has been discussing "default deny," an approach to ambiguities in existing guidelines, with significant impact on how to interpret the rules.
-
Blog Post Sep 01, 2020
Congratulations Jason! Network Products Guide has published its 2020 IT World Awards winners and Sectigo’s own CTO of PKI, Jason Soroko, was named the Gold Winner in the category Chief Technology Officer of the Year: Security Software.
-
Podcast Aug 31, 2020
Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT
Ripple20 is a set of vulnerabilities in the early Treck TCP/IP stack, a popular IoT choice. Learn their significance and how we can avoid these problems.