Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy Podcast

Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy

2019 saw the emergence of wholesale attacks on the world's energy infrastructure, an epidemic of ransomware incidents against municipalities, and a number of legislative measures to try to secure this whole set of systems and devices.
Root Causes 1-51: Blockchain vs PKI copy Podcast

Root Causes 1-51: Blockchain vs PKI copy

2019 has been an eventful year for PKI. In this episode, first in a series of four lookbacks at the year, our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
Root Causes 1-50: Energy Infrastructure Cyber Attacks copy Podcast

Root Causes 1-50: Energy Infrastructure Cyber Attacks copy

In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary?
Root Causes 1-49: California Consumer Privacy Act copy Podcast

Root Causes 1-49: California Consumer Privacy Act copy

Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join our hosts as we discuss recent attacks on power plants, why these attacks persist, and possible responses.
Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy copy Podcast

Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy copy

The California Consumer Privacy Act (CCPA) has been described by some as California's GDPR. This act provides broad protections to consumers in California, and businesses must comply starting January 1, 2020.
Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy Podcast

Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy

A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.
Root Causes 1-46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks copy Podcast

Root Causes 1-46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks copy

Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years.
Root Causes 1-45: What Is the CA/Browser Forum? copy Podcast

Root Causes 1-45: What Is the CA/Browser Forum? copy

In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system.
Root Causes 1-44: Automotive Device Security copy Podcast

Root Causes 1-44: Automotive Device Security copy

SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority?
Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy Podcast

Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy

The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven.