Malware and other web site attacks can result in reputational damage and site access being blocked or hindered by end user software and services.
Root Causes Podcast


Podcast Tags
Contributors
Showing 361 to 378 of 550 podcasts
December 8, 202115 min
By Tim Callan and Jason Soroko
An important trend sweeping enterprise IT is Robotic Process Automation. Our hosts define RPA and explain the importance of digital identity for RPA.
November 8, 202117 min
By Tim Callan and Jason Soroko
Apple recently announced that it would limit the allowable term for public S/MIME certificates to 825 days. We explain this declaration's implications.
Root Causes 186: Digital Signature SNAFU Costs Swiss Company 3 Billion Euro Contract
November 4, 202120 min
By Tim Callan and Jason Soroko
In this episode we explain how an esoteric digital signature error rendered a 3 billion Euro manufacturing contract with the Austrian government invalid.
November 2, 202117 min
By Tim Callan and Jason Soroko
The root certificates of the EU's Covid Passport program have suffered a private key compromise and counterfeit passports are for sale on the black market.
October 27, 202112 min
By Tim Callan and Jason Soroko
Certificate misconfiguration in commonly used college WiFi can expose logins. We discuss WiFi authentication, EAP, and how this vulnerability occurs.
October 21, 202114 min
By Tim Callan and Jason Soroko
A new white paper and set of toolkits illuminate MSCA root key attacks. We provide a clear action list for IT professionals in charge of Microsoft CA.
October 18, 202125 min
By Tim Callan and Jason Soroko
Let's Encrypt's recent root expiration caused widespread service outages. We discuss this expiration and the recipe for avoiding problems in the future.
August 30, 202113 min
By Tim Callan and Jason Soroko
Domain Control Validation (DCV) for SSL certificates using the "change to web site" method will be changing late this year. We explain these changes.
August 26, 202112 min
By Tim Callan and Jason Soroko
WE describe the PetitPotam MSCA attack and related terms like Mimikatz, pass-the-hash, and NTLM Relay, including a mitigation roadmap and free resources.
August 24, 202114 min
By Tim Callan and Jason Soroko
SSL is not the only regulated type of digital certificate. We discuss the rules for S/MIME, eIDAS, code signing, document signing, and SSH certificates.
August 20, 202114 min
By Tim Callan and Jason Soroko
We describe the various ways in which cryptocurrency can be stolen, including private key compromise, broker security failure, and login credential theft.
August 9, 202120 min
By Tim Callan and Jason Soroko
Passwordless is a hot topic in identity. We explain credential form factors and offer a specific definition of passwordless.
August 5, 202127 min
By Tim Callan and Jason Soroko
Sectigo is implementing an important change to its public-facing SSL certificate business called State-Locality Exclusivity. We explain in this episode.
August 2, 202121 min
By Tim Callan and Jason Soroko
Linters are a venerable coding tool has recently taken on new significant in the world of public certificates. Our hosts explain.
July 22, 202118 min
By Tim Callan and Jason Soroko
Whitelisting and blocklisting are tried and true elements of the computer industry. We define them and discuss their pros and cons.
July 27, 202116 min
By Tim Callan and Jason Soroko
Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. We discuss the implications of this announcement.
July 13, 202116 min
By Tim Callan and Jason Soroko
Non-fungible tokens uniquely identify digital assets using blockchain. We explain how NFTs work, and public assertion of ownership for digital files.