HackerGuardian - Sectigo PCI Compliance Technical Documents

HackerGuardian - Sectigo PCI Compliance

Generates two PCI network reports that are similar but intended for different purposes: One designed to offer proof of compliance, and the other to serve as a remediation guide.
AutoApplyOrder API Technical Documents

AutoApplyOrder API

Our new, single API – AutoApplyOrder – makes requesting not only our range of SSL certificates, but also new products such as CodeGuard, HackerGuardian PCI Compliance, VPN and easier than ever.
Root Causes 1-44: Automotive Device Security copy Podcast

Root Causes 1-44: Automotive Device Security copy

SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority?
Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy Podcast

Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy

The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven.
Root Causes 1-42: Anatomy of a Botnet copy Podcast

Root Causes 1-42: Anatomy of a Botnet copy

In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse.
Root Causes 1-41: What Is Blockchain's Killer App? copy Podcast

Root Causes 1-41: What Is Blockchain's Killer App? copy

We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau.
Root Causes 1-39: New University Research on Phishing and Certificates copy Podcast

Root Causes 1-39: New University Research on Phishing and Certificates copy

Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. Join us as we explain what blockchain actually does and how it compares to PKI.
Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy Podcast

Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy

The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a German technical university, investigates the patterns behind this certificate usage.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy

The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, and some interesting developments with malware-driven botnets.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy

Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361