Found 37 resources of type Podcast
Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks copy Podcast

Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks copy

Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community.
Root Causes 1 - 34: Shadow IT and PKI copy Podcast

Root Causes 1 - 34: Shadow IT and PKI copy

Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have?
Root Causes 1 - 33: Prepare for One-Year Limits on SSL Certificates copy Podcast

Root Causes 1 - 33: Prepare for One-Year Limits on SSL Certificates copy

Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO's ability to oversee and control the enterprise's technology systems.
Root Causes 1 - 31: Using PKI to Authenticate Phone Callers copy Podcast

Root Causes 1 - 31: Using PKI to Authenticate Phone Callers copy

The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration.
Root Causes 1 - 31: Using PKI to Authenticate Phone Callers copy Podcast

Root Causes 1 - 31: Using PKI to Authenticate Phone Callers copy

Few people know that caller ID numbers have no idBreaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing.
Root Causes 1 - 26: The White House Wants to Prohibit End-to-End Encryption copy Podcast

Root Causes 1 - 26: The White House Wants to Prohibit End-to-End Encryption copy

Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts today.
Root Causes 1 - 29: Vulnerabilities In Cisco Routers and Other Device Integrity Controls copy Podcast

Root Causes 1 - 29: Vulnerabilities In Cisco Routers and Other Device Integrity Controls copy

Recently we have seen major news items in some of the common Root Causes themes. Join our hosts as they discuss new whopping breach fines from GDPR and the FTC, and what happens when an entire country has its PII stolen.
Root Causes 1 - 29: Vulnerabilities In Cisco Routers and Other Device Integrity Controls copy Podcast

Root Causes 1 - 29: Vulnerabilities In Cisco Routers and Other Device Integrity Controls copy

The Kazakhstan government is taking measures to force citizens to trust its own root, enabling the widespread persecution of dissidents, journalists, and human rights advocates. Join our hosts now to learn more.
Root Causes 1 - 28: SSL Certificate Automation Through ACME copy Podcast

Root Causes 1 - 28: SSL Certificate Automation Through ACME copy

Security flaws in the device integrity modules of Cisco routers and other devices have lately filled the headlines. Join our hosts and guest Alan Grau as they discuss what is happening with these flaws, why, and what to do about it.
Root Causes 1 - 26: The White House Wants to Prohibit End-to-End Encryption copy Podcast

Root Causes 1 - 26: The White House Wants to Prohibit End-to-End Encryption copy

ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361