-
Listen Now
EPISODE 85
Broadcast Date:
April 23, 202017 minutes
Podcast Apr 23, 2020Root Causes 85: Automotive Key Fobs and Cryptography
Attacks compromising our cars' key fobs could be highly damaging. Join us to learn about the cryptographic architecture of a modern automotive key fob.
-
Learn More
Don’t ‘Compromise’ Your Code Amid Malware Mayhem
Blog Post from Sectigo
Blog Post Apr 21, 2020With EV Code Signing Certificates, the EV vetting process is mandated by the CA/Browser Forum, discouraging fraudsters from attempting to obtain them.
-
Listen Now
EPISODE 84
Broadcast Date:
April 20, 20209 minutes
Podcast Apr 20, 2020Root Causes 84: What Is DNS over HTTPS?
In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works.
-
Learn More
How to Keep Cybercriminals from Attacking Via Our Car Key Fobs
News Article from Sectigo
News Article Apr 18, 2020More and more cars are rolling off the lots using key fobs to handle a variety of operations, from simply unlocking the vehicle and remotely starting it to using a button push to have your smart vehicle automatically drive to where you are waiting. These car fobs can be wonderful, and very convenient—until it all goes bad.
-
Blog Post Apr 17, 2020
Introducing Sectigo Virtual Backgrounds
COVID-19 has changed almost everyone’s day-to-day lives. We hope that you and all of those you care about are staying healthy.
-
Learn More
Cybersecurity Expert Comments on Zoom and the Importance of Security
News Article from Sectigo
News Article Apr 16, 2020Zoom is making rapid security changes after being banned from a number of high-profile businesses including Siemens, SpaceX and Standard Chartered following high-profile criticism from the InfoSec community. Where does this leave Zoom and what can other businesses learn from its meteoric rise in popularity exposing weaknesses?
-
Learn More
CTO Talk: Q&A with Sectigo’s Jason Soroko
News Article from Sectigo
News Article Apr 16, 2020In this Q&A, the 13th in our weekly series, Jason Soroko explains why it’s important to remember that humans are the ones using technology, talks balancing research and customer meetings and why creating trustworthy electronic interactions “has been among society’s most important initiatives for the past three decades”.
-
Learn More
Sectigo Partners with Infineon to Protect IoT Devices
News Article from Sectigo
News Article Apr 16, 2020Sectigo, a provider of automated digital identity management and web security solutions, announced a partnership with Infineon Technologies AG to provide automated certificate provisioning for Infineon’s OPTIGA Trusted Platform Module (TPM) 2.0 using Sectigo IoT Identity Manager.
-
Learn More
How to Keep Cyber-Criminals and Cyber-Terrorists from Attacking Via...
News Article from Sectigo
News Article Apr 16, 2020An appropriate hardware solution is a first step toward building a secure authentication solution for automotive key fobs. This solution must be paired with an authentication solution that is not easily defeated. Use of asymmetric encryption with certificate-based authentication provides a strong defense against hacking. Certificate-based authentication requires a PKI solution to issue and manage certificates.
-
Listen Now
EPISODE 83
Broadcast Date:
April 16, 202025 minutes
Podcast Apr 16, 2020Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date?
Our hosts debate if and how the pandemic's disruptive nature might change the date on which quantum computers are able to defeat today's encryption.
-
Learn More
Sectigo and Infineon Partner for Automated Factory Cert Provisioning
Press Release from Sectigo
Press Release Apr 15, 2020The new Sectigo-Infineon integration provides manufacturers with a complete certificate management solution, including issuance and renewal, starting right on the factory floor, with secure certificate creation and insertion using the OPTIGA™ TPM for private key storage.
-
Blog Post Apr 15, 2020
“WE NEED DATA” . . . (Part I)
When you are the person in a conference room who says, “WE NEED DATA,” the odds are that you are likely the person tasked with collecting and presenting it