CABF has been discussing "default deny," an approach to ambiguities in existing guidelines, with significant impact on how to interpret the rules.
Root Causes Podcast


Podcast Tags
Contributors
Showing 433 to 450 of 550 podcasts
August 31, 202014 min
By Tim Callan, Jason Soroko, and Alan Grau
Ripple20 is a set of vulnerabilities in the early Treck TCP/IP stack, a popular IoT choice. Learn their significance and how we can avoid these problems.
August 21, 202012 min
By Tim Callan and Jason Soroko
Do quantum computers threaten SHA-2 and other hashing algorithms? Our hosts discuss the difference between Shor's Algorithms and Grover's Algorithm.
August 27, 202011 min
By Tim Callan and Jason Soroko
SXG certificates enable the display of AMP pages with the original publisher's authenticated URL in the mobile reader.
August 18, 202017 min
By Tim Callan and Jason Soroko
Though once considered a legitimate security option, certificate pinning is widely discredited for its certificate agility costs.
August 6, 202023 min
By Tim Callan and Jason Soroko
Our experts explain the pros and cons of single-domain, multi-domain, and wildcard certificates.
August 10, 202012 min
By Tim Callan and Jason Soroko
Unencrypted replication across data centers leaves data open to theft. Our hosts explain how this happens and what we can do about it.
August 13, 202013 min
By Tim Callan and Jason Soroko
Sectigo Quantum Labs is a destination for education on quantum-safe certificates (QSC). Our Quantum-Safe Kit enables creation of hybrid quantum-safe certs.
July 14, 202027 min
By Tim Callan and Jason Soroko
14 public CAs have to revoke intermediates and destroy their keys, putting millions of active SSL, S/MIME, and other public certificates at risk.
July 29, 202015 min
By Tim Callan and Jason Soroko
SMS-based one time password (OTP) is a common form of multi-factor authentication (MFA). Our hosts explain how this scheme fails the security test.
July 24, 202020 min
By Tim Callan and Jason Soroko
Root expirations occasionally make headlines by breaking systems, but it's a fact that certificates expire every day, each a outage waiting to happen.
July 20, 202021 min
By Tim Callan and Jason Soroko
ETSI has published its new Baseline Requirements for consumer IoT device security.
June 26, 202016 min
By Tim Callan and Jason Soroko
A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act is discussed in this week's episode.
June 21, 202015 min
By Tim Callan and Jason Soroko
Google has just announced the coming availability of end-to-end encryption for its chat service.
June 29, 202017 min
By Tim Callan and Jason Soroko
The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with.
July 6, 202029 min
By Tim Callan and Jason Soroko
Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.
July 8, 202021 min
By Tim Callan and Jason Soroko
Many people know that TOR is a browser used for anonymous online activity, but most of us don't know much more than that.
June 8, 202013 min
By Tim Callan and Jason Soroko
A new kind of identity certificate is coming that will enable businesses to include their logos in official email.