-
Podcast May 26, 2020
Root Causes 94: Revocation Checking Through OCSP and CRL
One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.
-
Podcast May 21, 2020
Root Causes 93: Videoconferencing Phishing
With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.
-
Podcast May 18, 2020
Root Causes 92: COVID-19 Immunity Passports
As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic "immunity passport" that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection). Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.
-
Podcast May 13, 2020
Root Causes 91: Rabobank Banking App Outage
"Zero Trust" is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization's environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.
-
Podcast May 11, 2020
Root Causes 90: An Analysis of Distributed PKI
Advocates of distributed PKI say it will eliminate weaknesses in traditional, hierarchical PKI. In this episode we test if these claims to see hold up.
-
Podcast May 07, 2020
Root Causes 89: PKI's Role in Zero Trust
"Zero Trust" maximizes protection from threats by controlling permissions for every individual, device, and process in the organization's environment.
-
Podcast May 04, 2020
Root Causes 88: PKI and Blockchain
Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain.
-
Podcast Apr 30, 2020
Root Causes 87: Zoom's (Not) End-to-End Encryption
With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology.
-
Podcast Apr 27, 2020
Root Causes 86: SSH Keys
SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon.
-
Podcast Apr 23, 2020
Root Causes 85: Automotive Key Fobs and Cryptography
Attacks compromising our cars' key fobs could be highly damaging. Join us to learn about the cryptographic architecture of a modern automotive key fob.
-
Podcast Apr 20, 2020
Root Causes 84: What Is DNS over HTTPS?
In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works.
-
Podcast Apr 16, 2020
Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date?
Our hosts debate if and how the pandemic's disruptive nature might change the date on which quantum computers are able to defeat today's encryption.