The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed. Learn how identity is an essential part of protecting any service involving IoT devices and how PKI is positioned to provide that identity.
RecordedFeb 24 202121 mins
Your place is confirmed, we'll send you email reminders
Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The more automated your approach to Digital Identity across the enterprise, the better off you are. Think about the risk of an outage if a certificate expires or if certificates are unknowingly deployed in your environment. How quickly can you swap out all of your certificates due to an unplanned or strategic event? Those are just a few examples, but you get the point! We cannot underestimate the impact of not using automation in identity management, especially as certificate lifespans are now becoming shorter and shorter, and quantum computing is looming on the horizon
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years. But what do we do about IoT devices, which may lack updating mechanisms and live in the field for decades with little available access. Our hosts are joined by repeat guest Alan Grau as we explore how IoT has specific requirements and challenges for quantum resistant crypto.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority? If you've ever wondered about questions like these join our hosts as they describe the origins of the CA/Browser Forum and how it operates.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven, new challenges that will come with increasingly advanced capabilities, and what manufacturers can do to protect drivers from harm.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse. In this episode our hosts embark on a nuanced exploration of the factors influencing this calculation and test whether popular estimates are credible.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau (VP of IoT and Embedded Security, Sectigo) joins us to help dissect today's botnets.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. While the two approaches accomplish some related goals, they are very different in how they work and ultimately accomplish different ends. Join us as we explain what blockchain actually does and how it compares to PKI, including some examples of use cases that are appropriate for each of these technologies.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner. In this episode we examine the potential for the quantum annealing approach to break RSA-based cryptography sooner than most people have been expecting, and the difficulty of predicting the "Z date" at all.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community. Join us to learn about this project to discover and vet going-forward crypto candidates, where we stand in the process, and where we go from here.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have? Join our hosts Tim Callan and Jason Soroko as they explain how to calculate the ominously named "Z date," the possible consequences of missing that deadline, and potential hairstyles for a post-apocalyptic world.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO's ability to oversee and control the enterprise's technology systems. This fragmentation leads to identity and access challenges that can affect security, governance, auditability, and compliance. Join our hosts as they discuss these challenges and what IT departments can do to address them.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts as they discuss public telephony systems and other environments that suffer from this problem, where this situation creates vulnerabilities, and what can be done about it.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Abul Salek, Director of Product Management at Sectigo
ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag. Join our hosts and guest Abul Salek as they discuss this ACME, why it's important, and what's next for this hugely popular standard.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The White House is the latest government entity seeking to defeat widespread encryption technology through legislated "back door" access. Join our hosts as they explain why such an idea is essentially unworkable and would endanger the confidential online business and personal services upon which we all depend.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
One cornerstone of successful cryptography is entropy, or the ability to create genuinely unpredictable values. But it turns out that generating truly random numbers is harder than you might think. Join our hosts as they discuss the need for randomness, the lengths companies go to to generate random numbers, and the bad things that can happen when they fail.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Occasional certificate revocation is an essential part of the digital certificate lifecycle and any secure PKI scheme. Not only do certificate owners need the revoke their own certificates, but also CAs sometimes need to revoke certificates to keep trust high. Join our hosts as they discuss the whys and wherefores of revocation by the CA, especially as it relates to code signing and malware.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Mozilla has decided to remove a public CA from its trusted root store. By doing so Mozilla renders public certificates from this CA essentially valueless for almost all use cases. Join our hosts as the examine the reasons for this decision, how CA rules are made and maintained, and why an action like this one ultimately is healthy for the internet as a whole.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud. Learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Automation of certificate deployment and management is a must for today's enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away. Join our hosts as they detail the whys and hows of enterprise certificate automation. A must-listen for anyone seeking to understand this rapidly emerging technology space.
We are the world's largest commercial SSL Certificate Authority. Our webinars are specially designed to help you protect your online business, connected devices, applications, and digital identities.
Root Causes Episode 13: PKI for IoTTim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]20 mins