-
Podcast Dec 10, 2020
Root Causes 134: 2020 Lookback - SASE and Zero Trust Architecture
2020 was a big year for SASE (Secure Access Service Edge). We define SASE, ZTNA (Zero Trust Network Architecture), and SDP (Software Defined Perimeter).
-
Podcast Dec 07, 2020
Root Causes 133: 2020 Lookback - COVID-19
In 2020 COVID-19 changed the way we work. Our hosts dicsuss the affect on employee access, Zero Trust, retail IT, immunity passports, and more.
-
Podcast Dec 04, 2020
Root Causes 132: Examining MFA Through Soft Tokens
In our ongoing examination of MFA, we examine authentication through soft-token OTP (one-time passcode) and compare it to SMS tokens and hard tokens.
-
Podcast Nov 30, 2020
Root Causes 131: Apple OCSP Slowdown Explained
Apple's Big Sur OS rollout drove a slowdown in the company's OCSP responders, affecting all Apple operating systems. We explain what happened and why.
-
Podcast Nov 24, 2020
Root Causes 130: How to Get Rid of Password Breaches
We discuss the weaknesses of passwords and why they nonetheless are still common. We describe the roadmap for weeding out passwords from most systems.
-
Podcast Nov 19, 2020
Root Causes 129: Examining MFA Through Hard Tokens
Hard tokens are an old multi-factor authentication (MFA) form factor, still in use today. We examine the strengths and weaknesses of hard tokens.
-
Podcast Nov 12, 2020
Root Causes 128: What Is Total Certificate Agility?
Certificate agility refers to building our systems so that all certificates are known, current, and immediately replaceable.
-
Podcast Nov 05, 2020
Root Causes 127: What a Chief Compliance Officer at a Public CA Does
Our hosts discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.
-
Podcast Oct 28, 2020
Root Causes 126: IoT Ransomware
New research shows how ransomware attacks could be launched against IoT devices. Understand these attacks and what can be done to defend against them.
-
Podcast Oct 08, 2020
Root Causes 125: Digital Identity Versus IAM
Certificate-based digital identity and Identity and Access Management (IAM) platforms are entirely different things. How do they fit in with each other?
-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Podcast Oct 01, 2020
Root Causes 123: Asymmetric Versus Symmetric Encryption
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.