Podcasts

Root Causes 352: FBI Vs. End-to-end Encryption in Meta Apps

Published: Jan. 4, 2024, midnight
Duration: 15 minutes 20 seconds

Listed in: Technology

Root Causes 351: 2024 Predictions

Published: Dec. 27, 2023, midnight
Duration: 18 minutes 8 seconds

Listed in: Technology

Root Causes 350: Public Certificates and the GDPR Right to Be Forgotten

Published: Dec. 21, 2023, midnight
Duration: 15 minutes 26 seconds

Listed in: Technology

Root Causes 349: 2023 Lookback - Overall Trends

Published: Dec. 18, 2023, midnight
Duration: 22 minutes 36 seconds

Listed in: Technology

Root Causes 348: What Is a Merkle Tree?

Published: Dec. 15, 2023, 4:22 p.m.
Duration: 12 minutes 5 seconds

Listed in: Technology

Root Causes 347: 2023 Lookback - Shortening Certificate Lifespans

Published: Dec. 11, 2023, midnight
Duration: 18 minutes 43 seconds

Listed in: Technology

Root Causes 346: Private Credentials In Public Code

Published: Dec. 8, 2023, midnight
Duration: 15 minutes 29 seconds

Listed in: Technology

Root Causes 345: Apple Versus European Sideloading

Published: Dec. 5, 2023, midnight
Duration: 12 minutes 40 seconds

Listed in: Technology

Root Causes 344: Introducing the PQC Onramp

Published: Nov. 29, 2023, midnight
Duration: 16 minutes 56 seconds

Listed in: Technology

Root Causes 343: The EIDAS 2.0 Controversy

Published: Nov. 22, 2023, midnight
Duration: 25 minutes 58 seconds

Listed in: Technology

Root Causes 342: Don't Change Your Password for Two Years

Published: Nov. 17, 2023, midnight
Duration: 11 minutes 22 seconds

Listed in: Technology

Root Causes 341: The Trouble with Security Questionnaires

Published: Nov. 13, 2023, midnight
Duration: 19 minutes 27 seconds

Listed in: Technology

Root Causes 340: Is This Podcast Canadian Enough?

Published: Nov. 6, 2023, midnight
Duration: 14 minutes 14 seconds

Listed in: Technology

Root Causes 339: The ROI of CLM

Published: Oct. 31, 2023, midnight
Duration: 11 minutes 22 seconds

Listed in: Technology

Root Causes 338: CLM and Your Career as an IT Professional

Published: Oct. 23, 2023, midnight
Duration: 19 minutes 19 seconds

Listed in: Technology

Root Causes 337: CLM and the IT Skills Gap

Published: Oct. 10, 2023, midnight
Duration: 20 minutes 34 seconds

Listed in: Technology

Root Causes 336: Digitally Signing Images on Cameras

Published: Oct. 3, 2023, midnight
Duration: 14 minutes 12 seconds

Listed in: Technology

Root Causes 335: When MFA Is Not MFA

Published: Sept. 29, 2023, midnight
Duration: 9 minutes 49 seconds

Listed in: Technology

Root Causes 334: What Is Attestation on the Web?

Published: Sept. 26, 2023, midnight
Duration: 18 minutes 2 seconds

Listed in: Technology

Root Causes 333: Intel Side Channel Attack Steals Private Keys

Published: Sept. 20, 2023, midnight
Duration: 16 minutes 54 seconds

Listed in: Technology

Root Causes 332: Acoustic AI-based Key Logging Attack

Published: Sept. 14, 2023, midnight
Duration: 10 minutes 35 seconds

Listed in: Technology

Root Causes 331: Microsoft Restores Trust to VeriSign Code Signing Root

Published: Sept. 13, 2023, midnight
Duration: 14 minutes 12 seconds

Listed in: Technology

Root Causes 330: End-to-end PQC in Use Today

Published: Sept. 5, 2023, midnight
Duration: 21 minutes 42 seconds

Listed in: Technology

Root Causes 329: What Is Messaging Layer Security?

Published: Aug. 29, 2023, midnight
Duration: 10 minutes 57 seconds

Listed in: Technology

Root Causes 328: What Is the Debian Weak Key Flaw?

Published: Aug. 23, 2023, midnight
Duration: 6 minutes 58 seconds

Listed in: Technology

Root Causes 327: What Is Multi-perspective Domain Validation?

Published: Aug. 18, 2023, midnight
Duration: 16 minutes 55 seconds

Listed in: Technology

Root Causes 326: The Difference Between .ml and .mil

Published: Aug. 15, 2023, midnight
Duration: 11 minutes 38 seconds

Listed in: Technology

Root Causes 325: Certificate Error Causes Sharepoint Outage

Published: Aug. 11, 2023, midnight
Duration: 9 minutes 38 seconds

Listed in: Technology

Root Causes 324: Apple Vs New UK Surveillance Bill

Published: Aug. 7, 2023, midnight
Duration: 15 minutes 38 seconds

Listed in: Technology

Root Causes 323: Update on Microsoft Key Compromise

Published: Aug. 2, 2023, midnight
Duration: 12 minutes 14 seconds

Listed in: Technology

Root Causes 322: RIP Kevin Mitnick

Published: July 31, 2023, midnight
Duration: 5 minutes 51 seconds

Listed in: Technology

Root Causes 321: CABF Moratorium on New Certificate Consumer Members

Published: July 26, 2023, midnight
Duration: 15 minutes 38 seconds

Listed in: Technology

Root Causes 320: Microsoft-signed Root Kit Attack

Published: July 24, 2023, midnight
Duration: 11 minutes 2 seconds

Listed in: Technology

Root Causes 319: EU Digital Wallets

Published: July 21, 2023, midnight
Duration: 20 minutes 20 seconds

Listed in: Technology

Root Causes 318: What Is ACME Renewal Information (ARI)?

Published: July 18, 2023, midnight
Duration: 10 minutes 8 seconds

Listed in: Technology

Root Causes 317: New Automotive CAN Bus Attacks Demand PKI

Published: July 13, 2023, midnight
Duration: 20 minutes 20 seconds

Listed in: Technology

Root Causes 316: SquareSpace Acquires Google Domains

Published: July 11, 2023, midnight
Duration: 12 minutes 53 seconds

Listed in: Technology

Root Causes 315: Will the SEC Sue SolarWinds Executives?

Published: July 7, 2023, midnight
Duration: 15 minutes 39 seconds

Listed in: Technology

Root Causes 314: AI-based Deepfakes in Real Crimes

Published: July 5, 2023, midnight
Duration: 26 minutes 15 seconds

Listed in: Technology

Root Causes 313: SSL Revocation Reason Codes

Published: June 22, 2023, midnight
Duration: 16 minutes 3 seconds

Listed in: Technology

Root Causes 312: You Shouldn't Roll Your Own Crypto

Published: June 20, 2023, midnight
Duration: 14 minutes 54 seconds

Listed in: Technology

Root Causes 311: What Is CCADB?

Published: June 16, 2023, midnight
Duration: 13 minutes 53 seconds

Listed in: Technology

Root Causes 310: Another AI Episode

Published: June 13, 2023, midnight
Duration: 25 minutes 14 seconds

Listed in: Technology

Root Causes 309: What Is Key Attestation for Code Signing?

Published: June 7, 2023, midnight
Duration: 11 minutes 17 seconds

Listed in: Technology

Root Causes 308: E-Tugra Root Deprecation

Published: June 5, 2023, midnight
Duration: 17 minutes 57 seconds

Listed in: Technology

Root Causes 307: OT Red Teaming Leads to Malware Attack

Published: May 31, 2023, midnight
Duration: 13 minutes 34 seconds

Listed in: Technology

Root Causes 306: Certificate Transparency Logs and Privacy

Published: May 26, 2023, midnight
Duration: 13 minutes 26 seconds

Listed in: Technology

Root Causes 305: The Fifth Pillar of Certificate Lifecycle Management

Published: May 22, 2023, midnight
Duration: 13 minutes 42 seconds

Listed in: Technology

Root Causes 304: Your 90-day SSL Certificates Checklist

Published: May 18, 2023, midnight
Duration: 13 minutes 44 seconds

Listed in: Technology

Root Causes 303: A Return to Chrome and the Address Bar

Published: May 16, 2023, midnight
Duration: 19 minutes 9 seconds

Listed in: Technology

Root Causes 302: Intel Secure Boot Private Key Leak

Published: May 12, 2023, midnight
Duration: 12 minutes 32 seconds

Listed in: Technology

Root Causes 301: The Difference Between Certificate Automation and CLM

Published: May 9, 2023, midnight
Duration: 14 minutes 55 seconds

Listed in: Technology

Root Causes 300: Chrome Eliminates the Lock Icon

Published: May 4, 2023, midnight
Duration: 18 minutes 39 seconds

Listed in: Technology

Root Causes 299: 2023 RSA Recap

Published: May 2, 2023, midnight
Duration: 31 minutes 7 seconds

Listed in: Technology

Root Causes 298: Moving Forward, Together - Promoting Automation

Published: April 28, 2023, midnight
Duration: 12 minutes 28 seconds

Listed in: Technology

Root Causes 297: Certificate Expiration Creates Starlink Outage

Published: April 26, 2023, midnight
Duration: 9 minutes 56 seconds

Listed in: Technology

Root Causes 296: SHOULD We or MUST We?

Published: April 21, 2023, midnight
Duration: 12 minutes 37 seconds

Listed in: Technology

Root Causes 295: Genesis Criminal Marketplace Taken Down

Published: April 17, 2023, midnight
Duration: 11 minutes 4 seconds

Listed in: Technology

Root Causes 294: Root Causes Honored by Webby Awards

Published: April 13, 2023, midnight
Duration: 9 minutes 9 seconds

Listed in: Technology

Root Causes 293: What Is Certbot?

Published: April 10, 2023, midnight
Duration: 12 minutes 32 seconds

Listed in: Technology

Root Causes 292: Validation Data Reuse for 90-day Certificates

Published: April 6, 2023, midnight
Duration: 15 minutes 20 seconds

Listed in: Technology

Root Causes 291: CLM and SIEM

Published: April 3, 2023, midnight
Duration: 9 minutes 39 seconds

Listed in: Technology

Root Causes 290: What Are QGIS and QIIS?

Published: March 29, 2023, midnight
Duration: 13 minutes 5 seconds

Listed in: Technology

Root Causes 289: What Is a Cryptographic Center of Excellence?

Published: March 27, 2023, midnight
Duration: 8 minutes 30 seconds

Listed in: Technology

Root Causes 288: ISARA Releases Patents on Hybrid Certificates

Published: March 22, 2023, midnight
Duration: 12 minutes 19 seconds

Listed in: Technology

Root Causes 287: GoDaddy Private Key Breach

Published: March 20, 2023, midnight
Duration: 13 minutes 47 seconds

Listed in: Technology

Root Causes 286: PKI and PQC in New White House Cybersecurity Initiative

Published: March 16, 2023, midnight
Duration: 10 minutes 4 seconds

Listed in: Technology

Root Causes 285: Can ChatGPT Write Malware?

Published: March 14, 2023, midnight
Duration: 16 minutes 9 seconds

Listed in: Technology

Root Causes 284: 90-day SSL Certificates Are on the Way

Published: March 10, 2023, midnight
Duration: 23 minutes 54 seconds

Listed in: Technology

Root Causes 283: Google Optional OCSP Proposal Clarified

Published: March 6, 2023, midnight
Duration: 11 minutes 18 seconds

Listed in: Technology

Root Causes 282: HSMs and Post Quantum Cryptography

Published: March 2, 2023, midnight
Duration: 28 minutes 36 seconds

Listed in: Technology

Root Causes 281: Google Proposes Optional OCSP

Published: Feb. 26, 2023, midnight
Duration: 26 minutes 22 seconds

Listed in: Technology

Root Causes 280: Did an AI Break CRYSTALS-Kyber?

Published: Feb. 24, 2023, midnight
Duration: 20 minutes 8 seconds

Listed in: Technology

Root Causes 279: ChatGPT Watermarking

Published: Feb. 19, 2023, midnight
Duration: 15 minutes 54 seconds

Listed in: Technology

Root Causes 278: Microsoft on Certificates and FIDO

Published: Feb. 17, 2023, midnight
Duration: 11 minutes 17 seconds

Listed in: Technology

Root Causes 277: Privacy Sandbox

Published: Feb. 13, 2023, midnight
Duration: 15 minutes 13 seconds

Listed in: Technology

Root Causes 276: ChatGPT and Identity Reputation

Published: Feb. 9, 2023, midnight
Duration: 8 minutes 5 seconds

Listed in: Technology

Root Causes 275: No Fly List Stolen

Published: Feb. 6, 2023, midnight
Duration: 8 minutes 27 seconds

Listed in: Technology

Root Causes 274: New Quantum Readiness Law

Published: Feb. 3, 2023, midnight
Duration: 13 minutes 53 seconds

Listed in: Technology

Root Causes 273: A Deep Dive on CA Agnostic

Published: Jan. 30, 2023, midnight
Duration: 21 minutes 17 seconds

Listed in: Technology

Root Causes 272: OCSP's Privacy Problem

Published: Jan. 27, 2023, midnight
Duration: 12 minutes 15 seconds

Listed in: Technology

Root Causes 271: A Whole Fleet of Identity-based Automotive Hacks

Published: Jan. 23, 2023, midnight
Duration: 22 minutes 20 seconds

Listed in: Technology

Root Causes 270: What Is the Difference Between KEM and PKE?

Published: Jan. 20, 2023, midnight
Duration: 11 minutes 54 seconds

Listed in: Technology

Root Causes 269: Did a Patent Dispute Nearly Derail Post Quantum Cryptography?

Published: Jan. 16, 2023, midnight
Duration: 9 minutes 51 seconds

Listed in: Technology

Root Causes 268: WAFs Subverted by JSON Bypass

Published: Jan. 12, 2023, midnight
Duration: 8 minutes 52 seconds

Listed in: Technology

Root Causes 267: Can Quantum Computers Break RSA Today?

Published: Jan. 9, 2023, midnight
Duration: 22 minutes 51 seconds

Listed in: Technology

Root Causes 266: End-to-end Encryption in the Apple Technology Stack

Published: Jan. 4, 2023, midnight
Duration: 17 minutes 56 seconds

Listed in: Technology

Root Causes 265: A Banner Year for Post-quantum Cryptography

Published: Dec. 28, 2022, midnight
Duration: 33 minutes 12 seconds

Listed in: Technology

Root Causes 264: Crypto Agility for 2023

Published: Dec. 23, 2022, midnight
Duration: 19 minutes 2 seconds

Listed in: Technology

Root Causes 263: Secure Connection Methods Roundup

Published: Dec. 20, 2022, midnight
Duration: 25 minutes 32 seconds

Listed in: Technology

Root Causes 262: The Continuing Erosion of Online Identity

Published: Dec. 14, 2022, midnight
Duration: 22 minutes 57 seconds

Listed in: Technology

Root Causes 261: Why I Don't Say Spoof

Published: Dec. 12, 2022, midnight
Duration: 10 minutes 7 seconds

Listed in: Technology

Root Causes 260: CA TrustCor Deprecated

Published: Dec. 8, 2022, midnight
Duration: 30 minutes 11 seconds

Listed in: Technology

Root Causes 259: What Went Wrong with the Twitter Blue Check Marks

Published: Nov. 30, 2022, midnight
Duration: 14 minutes 16 seconds

Listed in: Technology

Root Causes 258: New S/MIME Baseline Requirements Ratified

Published: Nov. 21, 2022, midnight
Duration: 17 minutes 4 seconds

Listed in: Technology

Root Causes 257: FTX Crypto Exchange Collapses

Published: Nov. 17, 2022, midnight
Duration: 11 minutes 24 seconds

Listed in: Technology

Root Causes 256: What Is Harvest and Decrypt?

Published: Nov. 16, 2022, midnight
Duration: 19 minutes 32 seconds

Listed in: Technology

Root Causes 255: What Is a Privacy Browser?

Published: Nov. 11, 2022, 3:02 p.m.
Duration: 22 minutes 47 seconds

Listed in: Technology

Root Causes 254: Toyota Symmetric Key Exposed on GitHub

Published: Nov. 8, 2022, midnight
Duration: 10 minutes 53 seconds

Listed in: Technology

Root Causes 253: OpenSSL Vulnerability Explained

Published: Nov. 4, 2022, midnight
Duration: 9 minutes 17 seconds

Listed in: Technology

Root Causes 252: Sidestepping Microsoft Email Encryption

Published: Oct. 30, 2022, midnight
Duration: 14 minutes 11 seconds

Listed in: Technology

Root Causes 251: What's Next for the NIST PQC Primitives?

Published: Oct. 27, 2022, midnight
Duration: 20 minutes 45 seconds

Listed in: Technology

Root Causes 250: 250 Episodes of Root Causes!

Published: Oct. 26, 2022, midnight
Duration: 26 minutes 33 seconds

Listed in: Technology

Root Causes 249: What Is MFA Exhaustion?

Published: Oct. 21, 2022, midnight
Duration: 10 minutes 23 seconds

Listed in: Technology

Root Causes 248: Azure Code Signing Announced

Published: Oct. 18, 2022, midnight
Duration: 9 minutes 26 seconds

Listed in: Technology

Root Causes 247: Uber Breach Unpacked

Published: Oct. 13, 2022, midnight
Duration: 12 minutes 1 second

Listed in: Technology

Root Causes 246: Google Chrome Root Program Announced

Published: Oct. 3, 2022, midnight
Duration: 12 minutes

Listed in: Technology

Root Causes 245: One Time Passcode as a Liability

Published: Sept. 29, 2022, midnight
Duration: 10 minutes 10 seconds

Listed in: Technology

Root Causes 244: PwC Survey Reports Cyber Security as Biggest Risk to Companies

Published: Sept. 26, 2022, midnight
Duration: 15 minutes 39 seconds

Listed in: Technology

Root Causes 243: Which Came First, the BRs or the EVGs?

Published: Sept. 20, 2022, midnight
Duration: 10 minutes 32 seconds

Listed in: Technology

Root Causes 242: Let's Encrypt Founder Peter Eckersley Passes

Published: Sept. 16, 2022, 6:47 p.m.
Duration: 7 minutes 4 seconds

Listed in: Technology

Root Causes 241: Is China Outspending the West in Quantum Computing?

Published: Sept. 12, 2022, midnight
Duration: 20 minutes 19 seconds

Listed in: Technology

Root Causes 240: Hyundai Production Private Key Found in How-to Manual

Published: Sept. 6, 2022, midnight
Duration: 15 minutes 39 seconds

Listed in: Technology

Root Causes 239: Post-quantum Cryptography Candidate SIKE Defeated

Published: Aug. 28, 2022, midnight
Duration: 17 minutes 30 seconds

Listed in: Technology

Root Causes 238: Tim's Big Phishing Adventure

Published: Aug. 15, 2022, midnight
Duration: 16 minutes 50 seconds

Listed in: Technology

Root Causes 237: Why Mozilla Is So Important to CAs

Published: Aug. 10, 2022, midnight
Duration: 11 minutes 55 seconds

Listed in: Technology

Root Causes 236: Active Directory Patch Knocks Out Non-MS Identity Consumers

Published: Aug. 4, 2022, midnight
Duration: 12 minutes 37 seconds

Listed in: Technology

Root Causes 235: What Is Lattice-based Cryptography?

Published: July 26, 2022, midnight
Duration: 26 minutes 23 seconds

Listed in: Technology

Root Causes 234: Report from the 2022 RSA Conference

Published: July 22, 2022, midnight
Duration: 10 minutes 13 seconds

Listed in: Technology

Root Causes 233: CISA Recommendations for Post-Quantum Crypto

Published: July 12, 2022, midnight
Duration: 25 minutes 26 seconds

Listed in: Technology

Root Causes 232: NIST Announces Post Quantum Crypto Selections

Published: July 8, 2022, midnight
Duration: 18 minutes 47 seconds

Listed in: Technology

Root Causes 231: What Is FIDO?

Published: July 6, 2022, midnight
Duration: 24 minutes 10 seconds

Listed in: Technology

Root Causes 230: What Is Apple Passkey?

Published: June 30, 2022, midnight
Duration: 15 minutes 54 seconds

Listed in: Technology

Root Causes 229: Browsing Collectives and the 80/20 Rule of Browser Privacy

Published: June 8, 2022, midnight
Duration: 21 minutes 40 seconds

Listed in: Technology

Root Causes 228: Getting the FLoC out of Here

Published: May 31, 2022, midnight
Duration: 14 minutes 21 seconds

Listed in: Technology

Root Causes 227: Let's Talk About Cookies

Published: May 27, 2022, midnight
Duration: 23 minutes 33 seconds

Listed in: Technology

Root Causes 226: The Six Benefits of SSH Certificates

Published: May 24, 2022, midnight
Duration: 21 minutes 28 seconds

Listed in: Technology

Root Causes 225: The Difference Between Relying Parties and Certificate Consumers

Published: May 19, 2022, midnight
Duration: 15 minutes 18 seconds

Listed in: Technology

Root Causes 224: The Five Problems with SSH Keys

Published: May 17, 2022, midnight
Duration: 19 minutes 15 seconds

Listed in: Technology

Root Causes 223: CT Log-Enabled Attacks on WordPress Sites

Published: May 11, 2022, midnight
Duration: 14 minutes 43 seconds

Listed in: Technology

Root Causes 222: Consolidation and PKI Solutions

Published: May 11, 2022, midnight
Duration: 10 minutes 19 seconds

Listed in: Technology

Root Causes 221: What Are SSH Keys?

Published: May 4, 2022, midnight
Duration: 14 minutes 55 seconds

Listed in: Technology

Root Causes 220: The Difference Between OTP and Passwordless

Published: May 2, 2022, midnight
Duration: 14 minutes 4 seconds

Listed in: Technology

Root Causes 219: New Quantum Cryptography Legislation Introduced

Published: April 26, 2022, midnight
Duration: 12 minutes 9 seconds

Listed in: Technology

Root Causes 218: PKI Nomenclature Oddities

Published: April 20, 2022, 5:47 p.m.
Duration: 30 minutes 15 seconds

Listed in: Technology

Root Causes 217: What's the Deal with the Recent Okta Security Breach?

Published: April 14, 2022, midnight
Duration: 24 minutes 28 seconds

Listed in: Technology

Root Causes 216: What Is crt.sh?

Published: April 10, 2022, midnight
Duration: 10 minutes 49 seconds

Listed in: Technology

Root Causes 215: Passwordless Authentication and Legacy Systems

Published: April 8, 2022, midnight
Duration: 23 minutes 35 seconds

Listed in: Technology

Root Causes 214: New DUO MFA Flaw Explained

Published: April 5, 2022, midnight
Duration: 11 minutes 16 seconds

Listed in: Technology

Root Causes 213: 600-domain Phishing Attack

Published: March 28, 2022, midnight
Duration: 8 minutes 4 seconds

Listed in: Technology

Root Causes 212: S/MIME Limited to Three Years

Published: March 28, 2022, midnight
Duration: 10 minutes 41 seconds

Listed in: Technology

Root Causes 211: Does CLM Make Wildcard and MDC Irrelevant?

Published: March 12, 2022, midnight
Duration: 14 minutes 13 seconds

Listed in: Technology

Root Causes 210: Living off the Land

Published: March 7, 2022, midnight
Duration: 6 minutes 32 seconds

Listed in: Technology

Root Causes 209: One-Day Deployment of Certificate Lifecycle Management (CLM) Platforms

Published: Feb. 28, 2022, midnight
Duration: 20 minutes 33 seconds

Listed in: Technology

Root Causes 208: Automotive Information Systems Bricked by HD Radio Error

Published: Feb. 24, 2022, 5:59 p.m.
Duration: 9 minutes 42 seconds

Listed in: Technology

Root Causes 207: Former Gartner Analyst David Mahdi Jumps on the Playing Field

Published: Feb. 21, 2022, midnight
Duration: 18 minutes 56 seconds

Listed in: Technology

Root Causes 206: What Is Web3?

Published: Feb. 13, 2022, midnight
Duration: 33 minutes 30 seconds

Listed in: Technology

Root Causes 205: Anatomy of an Encrypted Peer-to-Peer Mesh Network

Published: Feb. 9, 2022, midnight
Duration: 12 minutes 29 seconds

Listed in: Technology

Root Causes 204: PKI's Role in Passwordless

Published: Feb. 2, 2022, midnight
Duration: 22 minutes 55 seconds

Listed in: Technology

Root Causes 203: What Is a Credential Vault?

Published: Jan. 31, 2022, midnight
Duration: 10 minutes 44 seconds

Listed in: Technology

Root Causes 202 : What Is Certificate Transparency?

Published: Jan. 27, 2022, midnight
Duration: 15 minutes 33 seconds

Listed in: Technology

Root Causes 201: What Are the Baseline Requirements?

Published: Jan. 24, 2022, midnight
Duration: 16 minutes 14 seconds

Listed in: Technology

Root Causes 200: Why Not to Copy and Paste Commands from Web Pages

Published: Jan. 19, 2022, midnight
Duration: 7 minutes 7 seconds

Listed in: Technology

Root Causes 199: What Is Privileged Access Management?

Published: Jan. 13, 2022, midnight
Duration: 16 minutes

Listed in: Technology

Root Causes 198: Deep Voice Fakes

Published: Jan. 11, 2022, midnight
Duration: 14 minutes 52 seconds

Listed in: Technology

Root Causes 197: Tim's Digital Haircut

Published: Jan. 7, 2022, midnight
Duration: 11 minutes 58 seconds

Listed in: Technology

Root Causes 196: What Is Certificate Agnostic?

Published: Jan. 3, 2022, midnight
Duration: 10 minutes 27 seconds

Listed in: Technology

Root Causes 195: iOS App Privacy Audits

Published: Dec. 27, 2021, midnight
Duration: 5 minutes 58 seconds

Listed in: Technology

Root Causes 194: Crypto Versus Cryptocurrency

Published: Dec. 20, 2021, midnight
Duration: 13 minutes 50 seconds

Listed in: Technology

Root Causes 193: 4 Positive Security Trends for 2022

Published: Dec. 16, 2021, midnight
Duration: 15 minutes 53 seconds

Listed in: Technology

Root Causes 192: 14 Security Fallacies We Still Have in 2021

Published: Dec. 13, 2021, midnight
Duration: 24 minutes 29 seconds

Listed in: Technology

Root Causes 191: What Is Robotic Process Automation (RPA)?

Published: Dec. 8, 2021, midnight
Duration: 14 minutes 51 seconds

Listed in: Technology

Root Causes 190: Phishing Coinbase

Published: Nov. 29, 2021, midnight
Duration: 8 minutes 58 seconds

Listed in: Technology

Root Causes 189: What Is CA Agnostic?

Published: Nov. 17, 2021, midnight
Duration: 16 minutes 54 seconds

Listed in: Technology

Root Causes 188: Introduction to Web Security

Published: Nov. 11, 2021, midnight
Duration: 20 minutes 19 seconds

Listed in: Technology

Root Causes 187: Apple Limits Term for S/MIME Certificates

Published: Nov. 7, 2021, midnight
Duration: 16 minutes 53 seconds

Listed in: Technology

Root Causes 186: Digital Signature SNAFU Costs Swiss Company 3 Billion Euro Contract

Published: Nov. 4, 2021, midnight
Duration: 20 minutes 3 seconds

Listed in: Technology

Root Causes 185: EU Covid Passport Root Key Stolen

Published: Nov. 1, 2021, midnight
Duration: 16 minutes 59 seconds

Listed in: Technology

Root Causes 184: Popular College WiFi Vulnerability Revealed

Published: Oct. 26, 2021, midnight
Duration: 12 minutes

Listed in: Technology

Root Causes 183: New MSCA Attack Toolkits

Published: Oct. 21, 2021, midnight
Duration: 14 minutes 18 seconds

Listed in: Technology

Root Causes 182: Let's Encrypt Root Expiration

Published: Oct. 18, 2021, midnight
Duration: 25 minutes 28 seconds

Listed in: Technology

Root Causes 181: Limitation of DCV Through Web Site Changes

Published: Aug. 29, 2021, midnight
Duration: 13 minutes 6 seconds

Listed in: Technology

Root Causes 180: PetitPotam MSCA Attack

Published: Aug. 26, 2021, midnight
Duration: 12 minutes 8 seconds

Listed in: Technology

Root Causes 179: Standards for Certificates Apart from SSL

Published: Aug. 23, 2021, midnight
Duration: 14 minutes 22 seconds

Listed in: Technology

Root Causes 178: Stealing Cryptocurrency

Published: Aug. 20, 2021, midnight
Duration: 13 minutes 51 seconds

Listed in: Technology

Root Causes 177: What Is Passwordless?

Published: Aug. 9, 2021, midnight
Duration: 19 minutes 58 seconds

Listed in: Technology

Root Causes 176: Introducing State-Locality Exclusivity

Published: Aug. 5, 2021, midnight
Duration: 26 minutes 37 seconds

Listed in: Technology

Root Causes 175: What Is a Linter?

Published: Aug. 2, 2021, midnight
Duration: 20 minutes 32 seconds

Listed in: Technology

Root Causes 174: Windows 11 and TPMs

Published: July 27, 2021, midnight
Duration: 16 minutes 38 seconds

Listed in: Technology

Root Causes 173: Whitelisting and Blocklisting

Published: July 22, 2021, midnight
Duration: 18 minutes 22 seconds

Listed in: Technology

Root Causes 172: What Is an NFT?

Published: July 13, 2021, midnight
Duration: 16 minutes 28 seconds

Listed in: Technology

Root Causes 171: The Off-by-One-Second Problem

Published: July 8, 2021, midnight
Duration: 22 minutes 11 seconds

Listed in: Technology

Root Causes 170: Why Is Canada So Good at Cryptography?

Published: July 1, 2021, midnight
Duration: 18 minutes 33 seconds

Listed in: Technology

Root Causes 169: Bitcoin and the Anonymity Fallacy

Published: June 25, 2021, midnight
Duration: 23 minutes 51 seconds

Listed in: Technology

Root Causes 168: The Difference Between e-Signing and Digital Signing

Published: June 21, 2021, midnight
Duration: 19 minutes 5 seconds

Listed in: Technology

Root Causes 167: Colonial Pipeline Ransomware Attack

Published: June 15, 2021, midnight
Duration: 19 minutes 36 seconds

Listed in: Technology

Root Causes 166: The Trouble with OU Fields

Published: June 7, 2021, midnight
Duration: 10 minutes 24 seconds

Listed in: Technology

Root Causes 165: Blockchain - Proof of Work Versus Proof of Stake

Published: June 2, 2021, midnight
Duration: 26 minutes 32 seconds

Listed in: Technology

Root Causes 164: Examining MFA Through out-of-Band Phone Calling

Published: May 20, 2021, midnight
Duration: 10 minutes 32 seconds

Listed in: Technology

Root Causes 163: What Puts the I in PKI?

Published: May 12, 2021, midnight
Duration: 13 minutes 12 seconds

Listed in: Technology

Root Causes 162: What Is Sideloading?

Published: April 21, 2021, midnight
Duration: 13 minutes 34 seconds

Listed in: Technology

Root Causes 161: Consensus Algorithms and the Byzantine Generals Problem

Published: April 15, 2021, midnight
Duration: 22 minutes 2 seconds

Listed in: Technology

Root Causes 160: Purpose-built Quantum Computers for Breaking RSA

Published: April 8, 2021, midnight
Duration: 13 minutes 26 seconds

Listed in: Technology

Root Causes 159: Encrypted Communication Provider Indicted for Drug Trafficking and Money Laundering

Published: March 31, 2021, midnight
Duration: 15 minutes 25 seconds

Listed in: Technology

Root Causes 158: Exchange Server Vulnerabilities

Published: March 23, 2021, midnight
Duration: 13 minutes 7 seconds

Listed in: Technology

Root Causes 157: New Revocation Research

Published: March 19, 2021, midnight
Duration: 11 minutes 39 seconds

Listed in: Technology

Root Causes 156: Kazakhstan Root Attack Revisited

Published: March 16, 2021, midnight
Duration: 18 minutes 26 seconds

Listed in: Technology

Root Causes 155: Whats Good for Subscribers Is Good for Relying Parties

Published: March 11, 2021, midnight
Duration: 15 minutes 21 seconds

Listed in: Technology

Root Causes 154: Did Claus Peter Schnorr Just Break RSA?

Published: March 8, 2021, midnight
Duration: 17 minutes 45 seconds

Listed in: Technology

Root Causes 153: Too Many Roots

Published: March 5, 2021, midnight
Duration: 23 minutes 21 seconds

Listed in: Technology

Root Causes 152: Digital Certificates and the SunSpec Alliance

Published: March 2, 2021, midnight
Duration: 21 minutes 42 seconds

Listed in: Technology

Root Causes 151: What Is Rustls?

Published: Feb. 22, 2021, midnight
Duration: 14 minutes 58 seconds

Listed in: Technology

Root Causes 150: This Podcast Is Not About Alan Turing

Published: Feb. 14, 2021, midnight
Duration: 16 minutes 42 seconds

Listed in: Technology

Root Causes 149: Municipal Water Poisoning Through Cyber Attack

Published: Feb. 11, 2021, midnight
Duration: 11 minutes 32 seconds

Listed in: Technology

Root Causes 148: Can Australia Force Sites to Pay for Linking to Content?

Published: Feb. 8, 2021, midnight
Duration: 16 minutes 14 seconds

Listed in: Technology

Root Causes 147: Google Titan Secure Key Attack

Published: Feb. 5, 2021, midnight
Duration: 12 minutes 15 seconds

Listed in: Technology

Root Causes 146 : Congolese ccTLD Takeover

Published: Feb. 1, 2021, midnight
Duration: 9 minutes 49 seconds

Listed in: Technology

Root Causes 145: Google Chrome to Distrust CA Camerfirma

Published: Jan. 28, 2021, midnight
Duration: 11 minutes 12 seconds

Listed in: Technology

Root Causes 144: Whatever Happened to the Green Address Bar?

Published: Jan. 25, 2021, midnight
Duration: 13 minutes 35 seconds

Listed in: Technology

Root Causes 143: The Four Pillars of Certificate Automation

Published: Jan. 21, 2021, midnight
Duration: 27 minutes 53 seconds

Listed in: Technology

Root Causes 142: Removing Street Address and Postal Code from Public Certificates

Published: Jan. 18, 2021, midnight
Duration: 12 minutes 19 seconds

Listed in: Technology

Root Causes 141: The Case for Shorter Certificate Lifespans

Published: Jan. 11, 2021, midnight
Duration: 18 minutes 35 seconds

Listed in: Technology

Root Causes 140: SSL Attacks Using BGP (Border Gateway Protocol)

Published: Jan. 6, 2021, midnight
Duration: 20 minutes 3 seconds

Listed in: Technology

Root Causes 139: Exposed Private Keys in CSR Submissions

Published: Jan. 3, 2021, midnight
Duration: 10 minutes 10 seconds

Listed in: Technology

Root Causes 138: IoT Cybersecurity Improvement Act of 2020

Published: Dec. 27, 2020, midnight
Duration: 13 minutes 34 seconds

Listed in: Technology

Root Causes 137: SolarWinds Supply Chain Attack and Digital Identity

Published: Dec. 21, 2020, midnight
Duration: 30 minutes 50 seconds

Listed in: Technology

Root Causes 136: 2020 Lookback - Quantum Safe Certificates

Published: Dec. 17, 2020, midnight
Duration: 14 minutes 25 seconds

Listed in: Technology

Root Causes 135: The Heartbleed Vulnerability

Published: Dec. 14, 2020, midnight
Duration: 24 minutes 48 seconds

Listed in: Technology

Root Causes 134: 2020 Lookback - SASE and Zero Trust Architecture

Published: Dec. 9, 2020, midnight
Duration: 23 minutes 56 seconds

Listed in: Technology

Root Causes 133: 2020 Lookback - COVID-19

Published: Dec. 7, 2020, midnight
Duration: 24 minutes 21 seconds

Listed in: Technology

Root Causes 132: Examining MFA Through Soft Tokens

Published: Dec. 4, 2020, midnight
Duration: 16 minutes 47 seconds

Listed in: Technology

Root Causes 131: Apple OCSP Slowdown Explained

Published: Nov. 29, 2020, midnight
Duration: 17 minutes 18 seconds

Listed in: Technology

Root Causes 130: How to Get Rid of Password Breaches

Published: Nov. 24, 2020, midnight
Duration: 15 minutes 59 seconds

Listed in: Technology

Root Causes 129: Examining MFA Through Hard Tokens

Published: Nov. 19, 2020, midnight
Duration: 15 minutes 15 seconds

Listed in: Technology

Root Causes 128: What Is Total Certificate Agility?

Published: Nov. 12, 2020, midnight
Duration: 14 minutes 54 seconds

Listed in: Technology

Root Causes 127: What Does a Chief Compliance Officer at a Public CA Do?

Published: Nov. 5, 2020, midnight
Duration: 14 minutes 8 seconds

Listed in: Technology

Root Causes 126: IoT Ransomware

Published: Oct. 28, 2020, midnight
Duration: 18 minutes 1 second

Listed in: Technology

Root Causes 125: Digital Identity Versus IAM

Published: Oct. 8, 2020, midnight
Duration: 11 minutes 7 seconds

Listed in: Technology

Root Causes 124: Biometric MFA

Published: Oct. 5, 2020, midnight
Duration: 10 minutes 25 seconds

Listed in: Technology

Root Causes 123: Asymmetric Versus Symmetric Encryption

Published: Oct. 1, 2020, midnight
Duration: 21 minutes 55 seconds

Listed in: Technology

Root Causes 122: Passwordless Authentication for Apple OS

Published: Sept. 28, 2020, midnight
Duration: 32 minutes 54 seconds

Listed in: Technology

Root Causes 121 : What Is a Hardware Security Module?

Published: Sept. 21, 2020, midnight
Duration: 14 minutes 57 seconds

Listed in: Technology

Root Causes 120: PKI and SASE

Published: Sept. 18, 2020, midnight
Duration: 19 minutes 33 seconds

Listed in: Technology

Root Causes 119: What Is Crypto Agility?

Published: Sept. 14, 2020, midnight
Duration: 18 minutes 17 seconds

Listed in: Technology

Root Causes 118: Quantum Apocalypse - What Is a Hybrid Certificate?

Published: Sept. 7, 2020, midnight
Duration: 23 minutes 47 seconds

Listed in: Technology

Root Causes 117: Why Default Deny Matters to the CA/Browser Forum

Published: Sept. 4, 2020, midnight
Duration: 19 minutes 2 seconds

Listed in: Technology

Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT

Published: Aug. 30, 2020, midnight
Duration: 14 minutes 17 seconds

Listed in: Technology

Root Causes 115: Signed HTTP Exchange (SXG) Certificates

Published: Aug. 27, 2020, midnight
Duration: 11 minutes 14 seconds

Listed in: Technology

Root Causes 114: Is Quantum Computing a Threat to SHA-2?

Published: Aug. 21, 2020, midnight
Duration: 11 minutes 59 seconds

Listed in: Technology

Root Causes 113: What Is Certificate Pinning?

Published: Aug. 18, 2020, midnight
Duration: 17 minutes 22 seconds

Listed in: Technology

Root Causes 112: Introducing Sectigo Quantum Labs

Published: Aug. 13, 2020, midnight
Duration: 13 minutes 15 seconds

Listed in: Technology

Root Causes 111: Secure Data Interconnects

Published: Aug. 10, 2020, midnight
Duration: 12 minutes 38 seconds

Listed in: Technology

Root Causes 110: Single-domain, Multi-domain, and Wildcard SSL Certificates

Published: Aug. 6, 2020, midnight
Duration: 23 minutes 4 seconds

Listed in: Technology

Root Causes 109: Examining MFA Through Phone-based SMS

Published: July 29, 2020, midnight
Duration: 15 minutes 17 seconds

Listed in: Technology

Root Causes 108: Why Do Certificates Expire?

Published: July 24, 2020, midnight
Duration: 19 minutes 36 seconds

Listed in: Technology

Root Causes 107: IoT Security Baseline Requirements from ETSI

Published: July 20, 2020, midnight
Duration: 20 minutes 53 seconds

Listed in: Technology

Root Causes 106: Massive Intermediate Certificate Distrust Is on the Way

Published: July 14, 2020, midnight
Duration: 26 minutes 45 seconds

Listed in: Technology

Root Causes 105: TOR, How and Why

Published: July 8, 2020, midnight
Duration: 20 minutes 55 seconds

Listed in: Technology

Root Causes 104: 21 PKI Pitfalls to Avoid

Published: July 6, 2020, midnight
Duration: 28 minutes 28 seconds

Listed in: Technology

Root Causes 103: Work-from-Home IT Impact Study

Published: June 29, 2020, midnight
Duration: 16 minutes 30 seconds

Listed in: Technology

Root Causes 102: Lawful Access to Encrypted Data Act

Published: June 26, 2020, midnight
Duration: 15 minutes 58 seconds

Listed in: Technology

Root Causes 101: Google RCS Chat with End-to-End Encryption

Published: June 21, 2020, midnight
Duration: 14 minutes 55 seconds

Listed in: Technology

Root Causes 100: OpenSSH Deprecates SHA-1

Published: June 15, 2020, midnight
Duration: 11 minutes 46 seconds

Listed in: Technology

Root Causes 99: AddTrust Root Expiration Explained

Published: June 12, 2020, midnight
Duration: 28 minutes 25 seconds

Listed in: Technology

Root Causes 98: DMARC and Verified Mark Certificates for Email

Published: June 8, 2020, midnight
Duration: 12 minutes 38 seconds

Listed in: Technology

Root Causes 97: Firefox to Deprecate Support for FTP

Published: June 4, 2020, midnight
Duration: 11 minutes 20 seconds

Listed in: Technology

Root Causes 96: Signal May Leave the USA to Protect Its End-to-End Encryption

Published: June 1, 2020, midnight
Duration: 17 minutes 50 seconds

Listed in: Technology

Root Causes 95: Cryptographic Key Vaulting

Published: May 28, 2020, midnight
Duration: 12 minutes 47 seconds

Listed in: Technology

Root Causes 94: Revocation Checking Through OCSP and CRL

Published: May 26, 2020, midnight
Duration: 23 minutes 36 seconds

Listed in: Technology

Root Causes 93: Videoconferencing Phishing

Published: May 21, 2020, midnight
Duration: 14 minutes 13 seconds

Listed in: Technology

Root Causes 92: COVID-19 Immunity Passports

Published: May 18, 2020, midnight
Duration: 21 minutes 12 seconds

Listed in: Technology

Root Causes 91: Rabobank Banking App Outage

Published: May 13, 2020, midnight
Duration: 12 minutes

Listed in: Technology

Root Causes 90: An Analysis of Distributed PKI

Published: May 10, 2020, midnight
Duration: 24 minutes 33 seconds

Listed in: Technology

Root Causes 89: PKI's Role in Zero Trust

Published: May 7, 2020, midnight
Duration: 20 minutes 8 seconds

Listed in: Technology

Root Causes 88: PKI and Blockchain

Published: May 4, 2020, midnight
Duration: 13 minutes 2 seconds

Listed in: Technology

Root Causes 87: Zoom's (Not) End-to-End Encryption

Published: April 30, 2020, midnight
Duration: 17 minutes 33 seconds

Listed in: Technology

Root Causes 86: SSH Keys

Published: April 27, 2020, midnight
Duration: 18 minutes 4 seconds

Listed in: Technology

Root Causes 85: Automotive Key Fobs and Cryptography

Published: April 23, 2020, midnight
Duration: 16 minutes 53 seconds

Listed in: Technology

Root Causes 84: What Is DNS over HTTPS?

Published: April 20, 2020, midnight
Duration: 8 minutes 45 seconds

Listed in: Technology

Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date

Published: April 16, 2020, midnight
Duration: 25 minutes 21 seconds

Listed in: Technology

Root Causes 82: The Death of the Hard Token

Published: April 13, 2020, midnight
Duration: 16 minutes 23 seconds

Listed in: Technology

Root Causes 81: What Is Embedded Firewall?

Published: April 6, 2020, midnight
Duration: 14 minutes 35 seconds

Listed in: Technology

Root Causes 80: The Pros and Cons of VPNs

Published: April 2, 2020, midnight
Duration: 16 minutes 22 seconds

Listed in: Technology

Root Causes 79: Firefox Reinstates Support for Deprecated TLS Versions

Published: March 30, 2020, midnight
Duration: 11 minutes 25 seconds

Listed in: Technology

Root Causes 78: Extended Validation Certificates and the Dark Web

Published: March 26, 2020, midnight
Duration: 14 minutes 41 seconds

Listed in: Technology

Root Causes 77: Certificates for Public Cloud

Published: March 23, 2020, midnight
Duration: 9 minutes 21 seconds

Listed in: Technology

Root Causes 76: Implications of COVID-19 for PKI

Published: March 20, 2020, midnight
Duration: 26 minutes 48 seconds

Listed in: Technology

Root Causes 75: Sectigo's COVID-19 Readiness

Published: March 18, 2020, midnight
Duration: 4 minutes 40 seconds

Listed in: Technology

Root Causes 74: Device and Network Access

Published: March 17, 2020, midnight
Duration: 14 minutes 44 seconds

Listed in: Technology

Root Causes 73: Apple to Drop Support for Two-year SSL Certificates

Published: March 13, 2020, midnight
Duration: 20 minutes 38 seconds

Listed in: Technology

Root Causes 72: Future-proofing Your PKI

Published: March 9, 2020, midnight
Duration: 34 minutes 28 seconds

Listed in: Technology

Root Causes 71: Short Lived DevOps Certificates

Published: March 6, 2020, midnight
Duration: 21 minutes

Listed in: Technology

Root Causes 70: Identity Is the New Perimeter

Published: March 4, 2020, midnight
Duration: 27 minutes 24 seconds

Listed in: Technology

Root Causes 69: Fundamentals of DevOps and PKI

Published: Feb. 28, 2020, midnight
Duration: 22 minutes 10 seconds

Listed in: Technology

Root Causes 68: Why SHA-1 Is No Longer Secure

Published: Feb. 23, 2020, midnight
Duration: 31 minutes 53 seconds

Listed in: Technology

Root Causes 67: Definition of DevOps and DevSecOps

Published: Feb. 21, 2020, midnight
Duration: 22 minutes 11 seconds

Listed in: Technology

Root Causes 66: Functional Versus Homomorphic Encryption

Published: Feb. 18, 2020, midnight
Duration: 15 minutes 42 seconds

Listed in: Technology

Root Causes 65: Quantum Key Distribution

Published: Feb. 10, 2020, midnight
Duration: 18 minutes

Listed in: Technology

Root Causes 64: What Is Digital Identity?

Published: Feb. 4, 2020, midnight
Duration: 29 minutes 44 seconds

Listed in: Technology

Root Causes 63: What Is CAA?

Published: Jan. 27, 2020, midnight
Duration: 9 minutes 54 seconds

Listed in: Technology

Root Causes 62: Windows CryptoAPI Spoofing Vulnerability Explained

Published: Jan. 22, 2020, midnight
Duration: 18 minutes 18 seconds

Listed in: Technology

Root Causes 61: Anatomy of a Cryptocurrency

Published: Jan. 10, 2020, midnight
Duration: 31 minutes 26 seconds

Listed in: Technology

Root Causes 60: Fundamentals of Blockchain

Published: Jan. 6, 2020, midnight
Duration: 21 minutes 32 seconds

Listed in: Technology

Root Causes 1-59: What Is Certificate Transparency?

Published: Dec. 29, 2019, midnight
Duration: 21 minutes 26 seconds

Listed in: Technology

Root Causes 59: What Is Certificate Transparency?

Published: Dec. 28, 2019, midnight
Duration: 21 minutes 26 seconds

Listed in: Technology

Root Causes 1-58: 2019 Lookback - One Year of Podcasting

Published: Dec. 15, 2019, midnight
Duration: 13 minutes 59 seconds

Listed in: Technology

Root Causes 58: 2019 Lookback - One Year of Podcasting

Published: Dec. 14, 2019, midnight
Duration: 13 minutes 59 seconds

Listed in: Technology

Root Causes 1-57: Quantum Random Number Generation

Published: Dec. 11, 2019, midnight
Duration: 18 minutes 52 seconds

Listed in: Technology

Root Causes 57: Quantum Random Number Generation

Published: Dec. 10, 2019, midnight
Duration: 18 minutes 52 seconds

Listed in: Technology

Root Causes 1-56: 2019 Lookback - Evolving Cryptography

Published: Dec. 9, 2019, midnight
Duration: 23 minutes 10 seconds

Listed in: Technology

Root Causes 56: 2019 Lookback - Evolving Cryptography

Published: Dec. 8, 2019, midnight
Duration: 23 minutes 10 seconds

Listed in: Technology

Root Causes 1-55: California's New IoT Security Law

Published: Dec. 5, 2019, midnight
Duration: 22 minutes 16 seconds

Listed in: Technology

Root Causes 55: California's New IoT Security Law

Published: Dec. 4, 2019, midnight
Duration: 22 minutes 16 seconds

Listed in: Technology

Root Causes 1-54: 2019 Lookback - Infrastructure and IoT Security

Published: Dec. 2, 2019, midnight
Duration: 24 minutes 34 seconds

Listed in: Technology

Root Causes 54: 2019 Lookback - Infrastructure and IoT Security

Published: Dec. 1, 2019, midnight
Duration: 24 minutes 34 seconds

Listed in: Technology

Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI

Published: Nov. 24, 2019, midnight
Duration: 18 minutes 54 seconds

Listed in: Technology

Root Causes 53: 2019 Lookback - Governments Try to Control PKI

Published: Nov. 23, 2019, midnight
Duration: 18 minutes 54 seconds

Listed in: Technology

Root Causes 1-52: New TLS Certificate Incident Research

Published: Nov. 22, 2019, midnight
Duration: 24 minutes 7 seconds

Listed in: Technology

Root Causes 52: New TLS Certificate Incident Research

Published: Nov. 21, 2019, midnight
Duration: 24 minutes 7 seconds

Listed in: Technology

Root Causes 1-51: Blockchain vs PKI

Published: Nov. 19, 2019, midnight
Duration: 29 minutes 33 seconds

Listed in: Technology

Root Causes 51: Blockchain vs. PKI

Published: Nov. 18, 2019, midnight
Duration: 29 minutes 33 seconds

Listed in: Technology

Root Causes 1-50: Energy Infrastructure Cyber Attacks

Published: Nov. 8, 2019, midnight
Duration: 22 minutes 27 seconds

Listed in: Technology

Root Causes 50: Energy Infrastructure Cyber Attacks

Published: Nov. 7, 2019, midnight
Duration: 22 minutes 27 seconds

Listed in: Technology

Root Causes 1-49: California Consumer Privacy Act

Published: Nov. 6, 2019, midnight
Duration: 14 minutes 10 seconds

Listed in: Technology

Root Causes 49: California Consumer Privacy Act

Published: Nov. 5, 2019, midnight
Duration: 14 minutes 10 seconds

Listed in: Technology

Root Causes 1-48: Weaknesses in MFA Authentication

Published: Oct. 31, 2019, midnight
Duration: 15 minutes 35 seconds

Listed in: Technology

Root Causes 48: Weaknesses in MFA Authentication

Published: Oct. 30, 2019, midnight
Duration: 15 minutes 35 seconds

Listed in: Technology

Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT

Published: Oct. 25, 2019, midnight
Duration: 17 minutes 37 seconds

Listed in: Technology

Root Causes 47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT

Published: Oct. 24, 2019, midnight
Duration: 17 minutes 37 seconds

Listed in: Technology

Root Causes 1-46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks

Published: Oct. 22, 2019, midnight
Duration: 13 minutes 37 seconds

Listed in: Technology

Root Causes 46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks

Published: Oct. 21, 2019, midnight
Duration: 13 minutes 37 seconds

Listed in: Technology

Root Causes 1-45: What Is the CA/Browser Forum?

Published: Oct. 17, 2019, midnight
Duration: 23 minutes 14 seconds

Listed in: Technology

Root Causes 45: What Is the CA/Browser Forum?

Published: Oct. 16, 2019, midnight
Duration: 23 minutes 14 seconds

Listed in: Technology

Root Causes 1-44: Automotive Device Security

Published: Oct. 15, 2019, midnight
Duration: 17 minutes 8 seconds

Listed in: Technology

Root Causes 44: Automotive Device Security

Published: Oct. 14, 2019, midnight
Duration: 17 minutes 8 seconds

Listed in: Technology

Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality

Published: Oct. 11, 2019, midnight
Duration: 22 minutes 28 seconds

Listed in: Technology

Root Causes 43: Quantum Apocalypse - More on Mosca's Inequality

Published: Oct. 10, 2019, midnight
Duration: 22 minutes 28 seconds

Listed in: Technology

Root Causes 1-42: Anatomy of a Botnet

Published: Oct. 8, 2019, midnight
Duration: 24 minutes 43 seconds

Listed in: Technology

Root Causes 42: Anatomy of a Botnet

Published: Oct. 7, 2019, midnight
Duration: 24 minutes 43 seconds

Listed in: Technology

Root Causes 1-41: What Is Blockchain's Killer App?

Published: Oct. 3, 2019, midnight
Duration: 14 minutes 38 seconds

Listed in: Technology

Root Causes 41: What Is Blockchain's Killer App?

Published: Oct. 2, 2019, midnight
Duration: 14 minutes 38 seconds

Listed in: Technology

Root Causes 1-40: The Reports of RSA's Death Are Greatly Exaggerated

Published: Sept. 29, 2019, midnight
Duration: 9 minutes 9 seconds

Listed in: Technology

Root Causes 40: The Reports of RSA's Death Are Greatly Exaggerated

Published: Sept. 28, 2019, midnight
Duration: 9 minutes 9 seconds

Listed in: Technology

Root Causes 1-39: New University Research on Phishing and Certificates

Published: Sept. 26, 2019, midnight
Duration: 20 minutes 2 seconds

Listed in: Technology

Root Causes 39: New University Research on Phishing and Certificates

Published: Sept. 25, 2019, midnight
Duration: 20 minutes 2 seconds

Listed in: Technology

Root Causes 1-38: Interesting Breaches in August

Published: Sept. 23, 2019, midnight
Duration: 28 minutes 44 seconds

Listed in: Technology

Root Causes 38: Interesting Breaches in August

Published: Sept. 22, 2019, midnight
Duration: 28 minutes 44 seconds

Listed in: Technology

Root Causes 1-37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography?

Published: Sept. 10, 2019, midnight
Duration: 20 minutes 34 seconds

Listed in: Technology

Root Causes 37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography?

Published: Sept. 9, 2019, midnight
Duration: 20 minutes 34 seconds

Listed in: Technology

Root Causes 1-36: Quantum Apocalypse - The Search for Quantum Resistant Crypto

Published: Sept. 3, 2019, midnight
Duration: 21 minutes 1 second

Listed in: Technology

Root Causes 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto

Published: Sept. 2, 2019, midnight
Duration: 21 minutes 1 second

Listed in: Technology

Root Causes 1-35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks

Published: Aug. 28, 2019, midnight
Duration: 19 minutes 46 seconds

Listed in: Technology

Root Causes 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks

Published: Aug. 27, 2019, midnight
Duration: 19 minutes 46 seconds

Listed in: Technology

Root Causes 1-34: Shadow IT and PKI

Published: Aug. 25, 2019, midnight
Duration: 22 minutes 51 seconds

Listed in: Technology

Root Causes 34: Shadow IT and PKI

Published: Aug. 24, 2019, midnight
Duration: 22 minutes 51 seconds

Listed in: Technology

Root Causes 1-33: Prepare for One-Year Limits on SSL Certificates

Published: Aug. 18, 2019, midnight
Duration: 16 minutes 59 seconds

Listed in: Technology

Root Causes 33: Prepare for One-year Limits on SSL Certificates

Published: Aug. 17, 2019, midnight
Duration: 16 minutes 59 seconds

Listed in: Technology

Root Causes 1-32: Why Do Browsers and Academic Research Say Different Things About EV SSL?

Published: Aug. 15, 2019, midnight
Duration: 24 minutes 46 seconds

Listed in: Technology

Root Causes 32: Why Do Browsers and Academic Research Say Different Things About EV SSL?

Published: Aug. 14, 2019, midnight
Duration: 24 minutes 46 seconds

Listed in: Technology

Root Causes 1-31: Using PKI to Authenticate Phone Callers

Published: Aug. 12, 2019, midnight
Duration: 11 minutes 25 seconds

Listed in: Technology

Root Causes 31: Using PKI to Authenticate Phone Callers

Published: Aug. 11, 2019, midnight
Duration: 11 minutes 25 seconds

Listed in: Technology

Root Causes 1-30: When a Whole Country Has Its PII Stolen - Giant Breach Fines - Phishing with SSL

Published: Aug. 5, 2019, midnight
Duration: 16 minutes 32 seconds

Listed in: Technology

Root Causes Special Bulletin: Kazakhstan Weaponizes the Public CA

Published: July 29, 2019, midnight
Duration: 17 minutes 42 seconds

Listed in: Technology

Root Causes 1-29: Vulnerabilities in Cisco Routers and Other Device Integrity Controls

Published: July 24, 2019, midnight
Duration: 21 minutes 59 seconds

Listed in: Technology

Root Causes 29: Vulnerabilities in Cisco Routers and Other Device Integrity Controls

Published: July 23, 2019, midnight
Duration: 21 minutes 59 seconds

Listed in: Technology

Root Causes 1-28: SSL Certificate Automation Through ACME

Published: July 22, 2019, midnight
Duration: 22 minutes 56 seconds

Listed in: Technology

Root Causes 28: SSL Certificate Automation Through ACME

Published: July 21, 2019, midnight
Duration: 22 minutes 56 seconds

Listed in: Technology

Root Causes 1-27: Pending Safe Browser Guidelines from Germany

Published: July 18, 2019, midnight
Duration: 16 minutes 58 seconds

Listed in: Technology

Root Causes 27: Pending Safe Browser Guidelines from Germany

Published: July 17, 2019, midnight
Duration: 16 minutes 58 seconds

Listed in: Technology

Root Causes 1-26: The White House Wants to Prohibit End-to-End Encryption

Published: July 13, 2019, midnight
Duration: 18 minutes 30 seconds

Listed in: Technology

Root Causes 26: The White House Wants to Prohibit End-to-end Encryption

Published: July 11, 2019, midnight
Duration: 18 minutes 30 seconds

Listed in: Technology

Root Causes 1-25: Entropy and Random Numbers

Published: July 2, 2019, midnight
Duration: 19 minutes 15 seconds

Listed in: Technology

Root Causes 25: Entropy and Random Numbers

Published: July 1, 2019, midnight
Duration: 19 minutes 15 seconds

Listed in: Technology

Root Causes 1-24: Certificate Revocation

Published: June 27, 2019, midnight
Duration: 15 minutes 27 seconds

Listed in: Technology

Root Causes 24: Certificate Revocation

Published: June 26, 2019, midnight
Duration: 15 minutes 27 seconds

Listed in: Technology

Root Causes 1-23: Global Energy Grids Under Cyber Attack

Published: June 18, 2019, midnight
Duration: 15 minutes 48 seconds

Listed in: Technology

Root Causes 23: Global Energy Grids Under Cyber Attack

Published: June 17, 2019, midnight
Duration: 15 minutes 48 seconds

Listed in: Technology

Root Causes 22: Attacks on US Cities with EternalBlue Cyber Weapon

Published: June 7, 2019, 10:10 p.m.
Duration: 17 minutes 41 seconds

Listed in: Technology

Root Causes 1-22: Attacks on US Cities with EternalBlue Cyber Weapon

Published: June 7, 2019, 10:10 p.m.
Duration: 17 minutes 41 seconds

Listed in: Technology

Root Causes 21: New Texas Energy Grid Security Regulation

Published: June 5, 2019, 6:49 p.m.
Duration: 18 minutes 21 seconds

Listed in: Technology

Root Causes 1-21: New Texas Energy Grid Security Regulation

Published: June 5, 2019, 6:49 p.m.
Duration: 18 minutes 21 seconds

Listed in: Technology

Root Causes 20: 885 Million First American Financial Customer Docs Exposed

Published: May 31, 2019, 10:37 p.m.
Duration: 14 minutes 4 seconds

Listed in: Technology

Root Causes 1-20: 885 Million First American Financial Customer Docs Exposed

Published: May 31, 2019, 10:37 p.m.
Duration: 14 minutes 4 seconds

Listed in: Technology

Root Causes 1-19: Death of a Public CA

Published: May 29, 2019, midnight
Duration: 13 minutes 59 seconds

Listed in: Technology

Root Causes 19: Death of a Public CA

Published: May 28, 2019, midnight
Duration: 13 minutes 59 seconds

Listed in: Technology

Root Causes 1-18: SHA-1 Collisions - TLS Fingerprinting - Cisco Trust Anchor Flaw

Published: May 23, 2019, midnight
Duration: 21 minutes 44 seconds

Listed in: Technology

Root Causes 18: SHA-1 Collisions - TLS Fingerprinting - Cisco Trust Anchor Flaw

Published: May 22, 2019, midnight
Duration: 21 minutes 44 seconds

Listed in: Technology

Root Causes 17: Sectigo Acquires Icon Labs

Published: May 16, 2019, 10:13 p.m.
Duration: 19 minutes 43 seconds

Listed in: Technology

Root Causes 1-17: Sectigo Acquires Icon Labs

Published: May 16, 2019, 10:13 p.m.
Duration: 19 minutes 43 seconds

Listed in: Technology

Root Causes 1-16: PKI for DevOps Environments

Published: May 12, 2019, midnight
Duration: 23 minutes 18 seconds

Listed in: Technology

Root Causes 16: PKI for DevOps Environments

Published: May 11, 2019, midnight
Duration: 23 minutes 18 seconds

Listed in: Technology

Root Causes 15: Architecture for Enterprise Certificate Automation

Published: May 7, 2019, 4:18 p.m.
Duration: 19 minutes 15 seconds

Listed in: Technology

Root Causes 1-15: Architecture for Enterprise Certificate Automation

Published: May 7, 2019, 4:18 p.m.
Duration: 19 minutes 15 seconds

Listed in: Technology

Root Causes 14: P2P Vulnerability in IoT Devices

Published: May 2, 2019, 11:22 p.m.
Duration: 22 minutes 1 second

Listed in: Technology

Root Causes 1-14: P2P Vulnerability in IoT Devices

Published: May 2, 2019, 11:22 p.m.
Duration: 22 minutes 1 second

Listed in: Technology

Root Causes 13: PKI for IoT

Published: April 25, 2019, 9:34 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

Root Causes 1-13: PKI for IoT

Published: April 25, 2019, 9:34 p.m.
Duration: 20 minutes 14 seconds

Listed in: Technology

Root Causes 1-12: PKI in the News

Published: April 14, 2019, midnight
Duration: 19 minutes 10 seconds

Listed in: Technology

Root Causes 12: PKI in the News

Published: April 13, 2019, midnight
Duration: 19 minutes 10 seconds

Listed in: Technology

Root Causes 11: Authentication Is Not for the Authenticated

Published: April 9, 2019, 5:33 p.m.
Duration: 14 minutes 9 seconds

Listed in: Technology

Root Causes 1-11: Authentication Is Not for the Authenticated

Published: April 9, 2019, 5:33 p.m.
Duration: 14 minutes 9 seconds

Listed in: Technology

Root Causes 1-10: S/MIME Automated Deployment

Published: April 3, 2019, 7:58 p.m.
Duration: 18 minutes 40 seconds

Listed in: Technology

Root Causes 09: 63-bit Serial Numbers

Published: March 25, 2019, 6:45 p.m.
Duration: 15 minutes 12 seconds

Listed in: Technology

Root Causes 1-09: 63-bit Serial Numbers

Published: March 25, 2019, 6:45 p.m.
Duration: 15 minutes 12 seconds

Listed in: Technology

Root Causes 08: Free PKI Is Not Free

Published: March 19, 2019, 2:35 a.m.
Duration: 18 minutes 58 seconds

Listed in: Technology

Root Causes 1-08: Free PKI Is Not Free

Published: March 19, 2019, 2:35 a.m.
Duration: 18 minutes 58 seconds

Listed in: Technology

Root Causes 1-07: Russian Disconnection from the Internet

Published: Feb. 26, 2019, midnight
Duration: 11 minutes 30 seconds

Listed in: Technology

Root Causes 07: Russian Disconnection from the Internet

Published: Feb. 25, 2019, midnight
Duration: 11 minutes 30 seconds

Listed in: Technology

Root Causes 1-06: Quantum-Resistant Cryptography

Published: Feb. 19, 2019, midnight
Duration: 20 minutes 43 seconds

Listed in: Technology

Root Causes 06: Quantum-Resistant Cryptography

Published: Feb. 18, 2019, midnight
Duration: 20 minutes 43 seconds

Listed in: Technology

Root Causes 1-05: Cryptographic Quantum Apocalypse

Published: Feb. 7, 2019, midnight
Duration: 19 minutes 9 seconds

Listed in: Technology

Root Causes 05: Cryptographic Quantum Apocalypse

Published: Feb. 6, 2019, midnight
Duration: 19 minutes 9 seconds

Listed in: Technology

Root Causes 1-04: Australia's New IT Security Back Door

Published: Jan. 25, 2019, midnight
Duration: 25 minutes 7 seconds

Listed in: Technology

Root Causes 04: Australia's New IT Security Back Door

Published: Jan. 24, 2019, midnight
Duration: 25 minutes 7 seconds

Listed in: Technology

Root Causes 1-03: US Government Shutdown and Security Vulnerabilities

Published: Jan. 16, 2019, midnight
Duration: 15 minutes 22 seconds

Listed in: Technology

Root Causes 03: US Government Shutdown and Security Vulnerabilities

Published: Jan. 15, 2019, midnight
Duration: 15 minutes 22 seconds

Listed in: Technology

Root Causes 1-02: O2 Outage and Equifax Breach

Published: Jan. 8, 2019, midnight
Duration: 15 minutes 46 seconds

Listed in: Technology

Root Causes 02: O2 Outage and Equifax Breach

Published: Jan. 7, 2019, midnight
Duration: 15 minutes 46 seconds

Listed in: Technology

Root Causes 1-01: Introduction

Published: Jan. 4, 2019, midnight
Duration: 8 minutes 24 seconds

Listed in: Technology

Root Causes 01: Introduction

Published: Jan. 3, 2019, midnight
Duration: 8 minutes 24 seconds

Listed in: Technology