The pending Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, and connected devices.
Ressourcen
793 bis 810 von 817 ressourcen angezeigt
The state of Texas is leading the way with new legislation requiring cyber protections for its energy grid. Join our hosts as we explain this legislation.
Recent research reveals millions of consumer IoT devices lack authentication or encryption. Join our hosts as we discuss the nature of IoT-based botnets.
Russia plans to disconnect from the internet as a trial exercise for full-blown cyber warfare. Learn some of the problems facing Russia if they disconnect.
It was recently revealed that First American Title Corporation had 885 million confidential customer financial documents discoverable on its online site.
The proliferation of Internet of Things (IoT) devices has begun to outpace security. Learn more about the role of identity in protecting IoT devices.
A "free" Microsoft CA was alluring to enterprises in the 2000s. Learn about the seven common use cases where your traditional CA no longer does the job.
It was a busy news week for PKI and authenticated identity, and our hosts run through four current stories to clarify them. Tune in to learn the latest.
A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements.
S/MIME certificates indicate the authentic identity of the sender and enable encryption. Find out what the challenges to past adoption have been.
Mozilla has decided to remove a public CA from its trusted root store, rendering public certificates from this CA valueless for almost all use cases.
In December, users of O2 and Softbank experienced a data outage affecting 40 million. In 2017, 148 million lost their personal data in the Equifax breach.
With much debate about the importance of authentication in digital systems, it is key to remember the purpose of identity in cyber interactions.
Recent news has revealed several important developments in PKI and cyber trust. Our hosts cover the latest SHA-1 collision attack what it signals.
The US government shutdown has taken its toll on IT systems. Tune in to learn more about the risks of the ongoing shutdown to government infrastructure.
Intro to the leading PKI and security podcast. Learn your hosts' qualifications and the reasons for creating this podcast.
You can find the current Sectigo root and intermediate certificates here.
Um Ihren Code und Ihre Dokumente zu signieren, lassen Sie den Code und die Dokumente, die Sie authentifizieren möchten, durch einen Hash-Algorithmus laufen und verwenden dann Ihren privaten Schlüssel, um den Hash zu signieren, was zu einer digitalen…
Benötigen Sie Hilfe?
Benötigen Sie Hilfe beim Kauf? Kontaktieren Sie uns noch heute, um Ihr Zertifikat sofort zu erhalten.

