Root Causes 380: What If Quantum Supremacy Comes Earlier Than We Thought?
Repeat guest Bruno Coulliard gives us an update on the US government's migration to post-quantum...
29:31
Root Causes 380: What If Quantum Supremacy Comes Earlier Than We Thought?
Repeat guest Bruno Coulliard gives us an update on the US government's migration to post-quantum...
29:31
Root Causes 379: AI-generated Fake IDS for KYC
Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available...
13:28
Root Causes 378: Why Are Forced Revocations So Difficult?
In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into...
21:07
Root Causes 377: Is CPS/Issuance Misalignment a Revocation Event?
If you issue public certificates that are fully compliant except that they do not reflect what...
17:06
Root Causes 376: Gartner's New CLM Framework
Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core...
19:29
Root Causes 375: What Is Name Space Lifecycle Management?
In this guest episode we discuss name space hygiene with Geir Rasmussen, founder of NodeZro....
27:59
Root Causes 374: NIST Cyber Security Framework 2 Released
NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity...
14:31
Root Causes 373: Massive Brand Hijack Subverts More Than 21,000 Domains and Subdomains
A massive name space attack has hijacked more than 21,000 domains and subdomains, including a...
14:40
Root Causes 372: Bugzilla Bloodbath
It's a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up,...
22:05
Root Causes 371: MPIC Rules Go to CABF Ballot
A ballot for Multi-perspective Issuance Corroboration (MPIC), formerly known as MPDV, has entered...
20:17
Root Causes 370: Drama on Bugzilla
An evolving incident on Bugzilla has garnered a lot of attention and touches several important...
27:38
Root Causes 369: iMessage to Be PQC Enabled
Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the...
14:46
Root Causes 368: CRYSTALS-Kyber Is Now ML-KEM
What has been known as CRYSTALS-Kyber now has the new official name of Module Lattice-based Key...
09:07
Root Causes 367: Did an IoT Toothbrush Botnet Perform DDoS Attacks?
A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes,...
07:32
Root Causes 366: What Is eIDAS?
eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital...
27:13
Root Causes 365: What Is Subdomain Hijacking?
In this episode we explain subdomain hijacking, including dangling subdomains and how they can...
13:31
Root Causes 364: Video Conference Deepfake Enables $25 Million Theft
Deepfakes continue to show themselves as part of the standard criminal toolkit. A recent deepfake...
08:43
Root Causes 363: Defending Yourself Against Use of Stolen Privileges
CloudFlare recently published details of an attack it suffered as a downstream effect of a...
07:39
Root Causes 362: When You're Attacked by a State Actor
In this episode we share the details of a recent nation state actor attack on Microsoft and some...
10:06
Root Causes 361: The Premise of on Premise
In this episode we examine commonly held belief that on-premise systems give system...
37:01
Episode 281: Taking Risks
Episodio
Hadley Fraser: His Retrospective
Episodio
Ep.25 用五感主導的旅遊美學 從旅遊與&
Episodio