We discuss quantum clocks and their potential role in cryptography.

Tim Callan


Tim Callan has over 20 years of experience in the SSL and PKI technology spaces. Tim leads Sectigo's conformance with industry and regulatory requirements including browser root programs, WebTrust, CA/Browser Forum, and more. Tim is instrumental in driving initiatives to improve certificate agility and successful issuance. A founding member of the CA/Browser Forum and current vice-chair for one of its working groups, Tim is creator and co-host of Root Causes: A PKI and Security Podcast, the world’s most popular podcast dedicated to digital certificates. With 400+ episodes published, Tim is on the forefront of explaining trends that will be essential to the IT professionals, including shortening certificate lifespans and the coming change to post-quantum cryptography.
Recent posts by Tim Callan
The 2026 PKI landscape will be defined by automation, post-quantum readiness, vendor consolidation, AI-driven certificate management, and the rise of model signing as edge AI becomes mainstream.
We share our PKI predictions for 2026. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA distrust, AI model poisoning, and new attack vectors.
Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.
Certificate maximum term is shrinking. In this episode we examine exactly how short they could get.
In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.
With the first key milestone just over 100 days ahead, IT teams are facing a new reality: manual certificate management is no longer sustainable.
Why SLED institutions must adopt certificate automation ahead of the 47-day SSL lifecycle era
SLED agencies must automate certificates before the 47-day SSL era to avoid outages, noncompliance, and rising cyber risk.