-
Podcast Mar 18, 2020
Root Causes 75: Sectigo's COVID-19 Readiness
In this episode our hosts go over the results of Sectigo's COVID-19 readiness audit and what customers can expect in the months to come.
-
Podcast Mar 17, 2020
Root Causes 74: Device and Network Access
Our hosts are joined by David Colon as we explore the role certificates play in providing network access and permissions, including some best practices.
-
Podcast Mar 13, 2020
Root Causes 73: Apple to Drop Support for Two-year SSL Certificates
Apple announced it will distrust TLS certificates issued with terms over thirteen months for its products. We discuss this change and its implications.
-
Podcast Mar 10, 2020
Root Causes 72: Future-proofing Your PKI
Former CableLabs CIO and Kyrio CEO Mitch Ashley joins our hosts to discuss how to set up a PKI system that will meet your needs for many years to come.
-
Podcast Mar 06, 2020
Root Causes 71: Short Lived DevOps Certificates
Repeat guest and DevOps expert David Colon joins us again to discuss identity for microservices, including the use of very short-lived TLS certificates.
-
Podcast Mar 04, 2020
Root Causes 70: Identity Is the New Perimeter
Modern processes have shattered the old concept of an enterprise IT perimeter. In this episode our hosts discuss various identity schemes and challenges.
-
Podcast Feb 28, 2020
Root Causes 69: Fundamentals of DevOps and PKI
In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI.
-
Podcast Feb 24, 2020
Root Causes 68: Why SHA-1 Is No Longer Secure
SHA-1 was a cornerstone of the early secure web. 25 years later this hashing function is no longer secure. Join our hosts to hear the history of SHA-1.
-
Podcast Feb 21, 2020
Root Causes 67: Definition of DevOps and DevSecOps
What does DevOps mean in today's enterprise. We explore cultural implications, "configuration drift," definition of release velocity, and DevSecOps.
-
Podcast Feb 18, 2020
Root Causes 66: Functional Versus Homomorphic Encryption
Homomorphic encryption allows select data to be gleaned from a file even while it remains encrypted. Learn about this approach and its implications.
-
Podcast Feb 10, 2020
Root Causes 65: Quantum Key Distribution
Join us as we explain how quantum key distribution works, why it is not the same as quantum safe cryptography, and which cases it may be useful for.
-
Podcast Feb 04, 2020
Root Causes 64: What Is Digital Identity?
The phrase "identity is the new perimeter" has gained in use, but what do we mean when we say identity?