-
Podcast Jul 06, 2020
Root Causes 104: 21 PKI Pitfalls to Avoid
Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.
-
Podcast Jun 29, 2020
Root Causes 103: Work-from-Home IT Impact Study
The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with.
-
Podcast Jun 26, 2020
Root Causes 102: Lawful Access to Encrypted Data Act
A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act is discussed in this week's episode.
-
Podcast Jun 21, 2020
Root Causes 101: Google RCS Chat with End-to-End Encryption
Google has just announced the coming availability of end-to-end encryption for its chat service.
-
Podcast Jun 15, 2020
Root Causes 100: OpenSSH Deprecates SHA-1
Once widely used, SHA-1 is considered insecure today and has been deprecated from the most common PKI use cases.
-
Podcast Jun 12, 2020
Root Causes 99: AddTrust Root Expiration Explained
The recent expiration of Sectigo's AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend.
-
Podcast Jun 08, 2020
Root Causes 98: DMARC and Verified Mark Certificates for Email
A new kind of identity certificate is coming that will enable businesses to include their logos in official email.
-
Podcast Jun 04, 2020
Root Causes 97: Firefox to Deprecate Support for FTP
Mozilla has announced its intention to remove support for FTP from the Firefox browser.
-
Podcast Jun 01, 2020
Root Causes 96: Signal May Leave USA to Protect End-to-End Encryption
Congress's proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication.
-
Podcast May 28, 2020
Root Causes 95: Cryptographic Key Vaulting
For PKI to be secure, private keys need to remain private. In this episode we explain "vaulting" for keys or other shared secrets.
-
Podcast May 26, 2020
Root Causes 94: Revocation Checking Through OCSP and CRL
One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.
-
Podcast May 21, 2020
Root Causes 93: Videoconferencing Phishing
With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.