Found 45 resources of type Podcast
Root Causes 1-44: Automotive Device Security copy Podcast

Root Causes 1-44: Automotive Device Security copy

SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority?
Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy Podcast

Root Causes 1-43: Quantum Apocalypse - More on Mosca's Inequality copy

The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven.
Root Causes 1-42: Anatomy of a Botnet copy Podcast

Root Causes 1-42: Anatomy of a Botnet copy

In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse.
Root Causes 1-41: What Is Blockchain's Killer App? copy Podcast

Root Causes 1-41: What Is Blockchain's Killer App? copy

We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau.
Root Causes 1-39: New University Research on Phishing and Certificates copy Podcast

Root Causes 1-39: New University Research on Phishing and Certificates copy

Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. Join us as we explain what blockchain actually does and how it compares to PKI.
Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy Podcast

Root Causes 1 - 38 - Interesting Breaches In August Mixdown copy

The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a German technical university, investigates the patterns behind this certificate usage.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy

The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, and some interesting developments with malware-driven botnets.
Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy Podcast

Root Causes 1 - 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto copy

Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner.
Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks copy Podcast

Root Causes 1 - 35: Quantum Apocalypse - Mosca's Inequality, Mad Max, and Mohawks copy

Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community.
Root Causes 1 - 34: Shadow IT and PKI copy Podcast

Root Causes 1 - 34: Shadow IT and PKI copy

Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have?

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361