Root Causes: A PKI and Security Podcast-logo

Root Causes: A PKI and Security Podcast

Technology Podcasts >

Computer and internet industry veteran. Fifteen years in digital certificate industry. Author, blogger, and speaker.

Computer and internet industry veteran. Fifteen years in digital certificate industry. Author, blogger, and speaker.
More Information

Location:

United States

Description:

Computer and internet industry veteran. Fifteen years in digital certificate industry. Author, blogger, and speaker.

Language:

English


Episodes

Root Causes 1 - 18 - SHA - 1 Collisions - TLS Fingerprinting - Cisco Trust Anchor Flaw

5/23/2019
More
Recent news has revealed several important developments in PKI and cyber trust. Our hosts cover the latest SHA-1 collision attack and why it signals the inevitable death of this hashing algorithm. We explain TLS fingerprinting and how it enables malware to defeat firewall AI protections. And we walk through reports of a flaw in the implementation of secure elements on Cisco routers.

Duration:00:21:42

Root Causes 1-17: Sectigo Acquires Icon Labs

5/16/2019
More
Sectigo's recent acquisition of Icon Labs expands the company's capabilities in embedded OEM and device identity. Jason and Tim are joined by Icon Labs co-founder Alan Grau as our podcasters explore the needs and potential vulnerabilities for connected devices and the suite of technologies that can address these security requirements.

Duration:00:19:41

Root Causes 1-16: PKI for DevOps Environments

5/14/2019
More
DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud. Learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.

Duration:00:23:18

Root Causes 1-15: Architecture for Enterprise Certificate Automation

5/7/2019
More
Automation of certificate deployment and management is a must for today's enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away. Join our hosts as they detail the whys and hows of enterprise certificate automation. A must-listen for anyone seeking to understand this rapidly emerging technology space.

Duration:00:19:15

Root Causes 1-14: P2P Vulnerability in IoT Devices

5/2/2019
More
Recent research reveals millions of consumer IoT devices that lack any level of authentication or encryption at all. Join our hosts as we discuss the nature of IoT-based botnets and their negative consequences on enterprises, consumers, and the internet at large, including DDoS, phishing, and more.

Duration:00:22:01

Root Causes 1-13: PKI for IoT

4/25/2019
More
The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed. Learn how identity is an essential part of protecting any service involving IoT devices and how PKI is positioned to provide that identity.

Duration:00:20:12

Root Causes 1-12: PKI in the News

4/16/2019
More
It was a busy news week for PKI and authenticated identity, and our hosts run through four current stories to clarify them. Tune in to learn the latest about the Dragonblood WPA3 vulnerability, Russian spoofing of GPS/GNSS navigation signals, Know Your Customer (KYC) for social media sites, and a Chinese national's apparent attempt to install a USB rootkit somewhere in Mar-a-Lago.

Duration:00:19:08

Root Causes 1-11: Authentication Is Not for the Authenticated

4/9/2019
More
With so much debate about the role and importance of authentication in digital systems, it is important to remember the purpose of authenticated identity in our cyber interactions. Join us for a discussion of who benefits from known identity, what can go wrong when identity is obscured, and why ecosystems must include incentives for members to participate in identity authentication.

Duration:00:14:08

Root Causes 1-10: S/MIME Automated Deployment

4/3/2019
More
S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments - providing strong defenses against a variety of email-based attacks. Nonetheless, adoption today is extremely small. Find out what the challenges to past adoption have been for this underutilized security technology and what the industry is doing to help enterprises secure their email today.

Duration:00:18:38

Root Causes 1-09: 63-bit Serial Numbers

3/25/2019
More
A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements. Learn how it is that 64-bit certificate serial numbers might offer only 63 bits of entropy and what CAs have to do about it.

Duration:00:15:10

Root Causes 1-08: Free PKI Is Not Free

3/18/2019
More
The promise of a "free" Microsoft CA was alluring to enterprises in the 2000s, but today's increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA. Learn about the seven common use cases where your traditional CA no longer does the job.

Duration:00:18:56

Root Causes 1-07: Russian Disconnection from the Internet

2/25/2019
More
Russia has stated that it will disconnect from the internet as a trial exercise for full-blown cyber warfare. This idea presents many problems for Russian services, systems, and businesses, especially since they depend on global systems such as DNS and public Certificate Authorities. Join us to learn some of the problems facing Russia will face if indeed it disconnects.

Duration:00:11:29

Root Causes 1-06: Quantum-Resistant Cryptography

2/18/2019
More
The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.

Duration:00:20:41

Root Causes 1-05: Cryptographic Quantum Apocalypse

2/6/2019
More
As quantum computing continues to progress, the world's widespread cryptographic schemes are in danger. To prepare for the cryptographic "Quantum Apocalypse" we will need to replace our RSA- and ECC-based schemes with a new set of ciphers.

Duration:00:19:07

Root Causes 1-04: Australia's New IT Security Back Door

1/24/2019
More
Australia now requires a back door to IT systems. Our hosts are skeptical that this idea will work. Join our PKI experts to learn about the dangers and pitfalls of such a system - and why they have failed in the past.

Duration:00:25:04

Root Causes 1-03: US Government Shutdown and Security Vulnerabilities

1/15/2019
More
The US government shutdown has taken its toll on IT systems. Services are going offline, and we are ill equipped to deal with a major security or service crisis. Tune in to learn more about the risks of the ongoing shutdown to the government's technical infrastructure.

Duration:00:15:20

Root Causes 1-02: O2 Outage and Equifax Breach

1/7/2019
More
In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach. The common thread? Both occurred due to certificate expirations. Join our hosts to learn more about this trending vulnerability.

Duration:00:15:44

Root Causes 1-01: Introduction

1/3/2019
More
Intro to the leading PKI and security podcast. Learn your hosts' qualifications and reasons for creating this podcast.

Duration:00:08:23