Hi [[ session.user.profile.firstName ]]

Root Causes Episode 86: SSH Keys

SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.
Recorded Jun 2 2021 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
Presentation preview: Root Causes Episode 86: SSH Keys

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Applying the best Zero Trust principles to modern network architecture Jul 22 2021 3:00 pm UTC 60 mins
    Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    Recent cyberattacks have shown that security perimeters are not unbreachable and that all network connections, both inside and outside the enterprise, should be considered potentially hostile. Tim Callan and Jason Soroko explain how Sectigo views the Zero Trust Network Architecture and how certificate-based authentication is essential to implementing the secure enterprise of today and tomorrow.
  • The Four Pillars of Certificate Automation Jun 30 2021 1:00 pm UTC 52 mins
    Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    The more automated your approach to Digital Identity across the enterprise, the better off you are. Think about the risk of an outage if a certificate expires or if certificates are unknowingly deployed in your environment. How quickly can you swap out all of your certificates due to an unplanned or strategic event? Those are just a few examples, but you get the point! We cannot underestimate the impact of not using automation in identity management, especially as certificate lifespans are now becoming shorter and shorter, and quantum computing is looming on the horizon
  • Root Causes Episode 94: Revocation Checking Through OCSP and CRL Recorded: Jun 11 2021 24 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.
  • Root Causes Episode 93: Videoconferencing Phishing Recorded: Jun 9 2021 15 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.
  • Root Causes Episode 89: PKI's Role in Zero Trust Recorded: Jun 7 2021 21 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    "Zero Trust" is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization's environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.
  • Root Causes Episode 88: PKI and Blockchain Recorded: Jun 4 2021 14 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
    Many observers notice similarities between PKI and blockchain, including their applicability to secure digital systems and their ability to enable authentic information and non-repudiation in an electronic environment. Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain, explain the qualities of a good use case for each, and describe how they can complement each other.
  • Root Causes Episode 86: SSH Keys Recorded: Jun 2 2021 19 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
    SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.
  • Root Causes Episode 85: Automotive Key Fobs and Cryptography Recorded: Jun 1 2021 17 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
    Recent headlines have unveiled high profile attacks against automobile key fobs. Such an attack is potentially huge since successfully mimicking these fobs can yield complete access to an automobile's capabilities. Our hosts are joined by repeat guest Alan Grau as they describe the cryptographic architecture of a modern automotive key fob, how these attacks take place, and what automobile manufacturers can do about it.
  • Root Causes Episode 84: What is DNS over HTTPS? Recorded: May 28 2021 9 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    DNS over HTTPS is a capability whereby DNS lookups can be encrypted to defend against certain man-in-the-middle attacks as well as protecting information about web usage from being revealed to third parties. In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works. They also explain some of the controversy and potential concerns that have been raised with this approach.
  • Root Causes Episode 82: The Death of the Hard Token Recorded: May 26 2021 17 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    People are working from home in unprecedented numbers, which means that companies need to find ways for them to connect securely. Some will consider hard tokens as an option. In this episode our hosts give a frank assessment of the difficulty that hard tokens present for the modern remote workforce, along with some of the other available options that are likely to serve the enterprise better.
  • 21 PKI Pitfalls to Avoid Recorded: May 25 2021 45 mins
    Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    When you're implementing or modifying PKI across your infrastructure, there are many ways it can go wrong. We've outlined 21 of the most common PKI mistakes and how to avoid them. But don't freak out; we've categorized them into five themes, all of which we will cover in this 45-minute webinar.

    Join Sectigo Chief Compliance Officer Tim Callan and CTO of PKI Jason Soroko as they discuss in detail these common PKI pitfalls to avoid:
    • Certificate problems
    • Deployment problems
    • Systemic security problems
    • Governance problems
    • Visibility problems
  • Root Causes Episode 81: What is Embedded Firewall? Recorded: May 24 2021 15 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
    Security for IoT devices depends not only on establishing strong identity mechanisms for devices and the services they connect to but also in ensuring the ongoing integrity of device operations. In this episode our hosts are joined by guest Alan Grau to explain what an embedded firewall is and how it aids security for connected devices.
  • Root Causes Episode 80: The Pros and Cons of VPNs Recorded: May 21 2021 17 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    With the sudden, meteoric increase in remote workers, many IT professionals are looking at VPN as a method of keeping them secure. Join our hosts as they discuss the advantages and disadvantages of VPNs, and what to look out for.
  • Root Causes Episode 77: Certificates for Public Cloud Recorded: May 19 2021 10 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    As a convenience to customers and a competitive differentiator, public cloud services such as AWS offer TLS certificates for use in their environments. Join our hosts as they explain this practice, how these certificates can be used, and which use cases and environments will not work with TLS certificates from public cloud vendors.
  • Root Causes Episode 74: Device and Network Access Recorded: May 17 2021 15 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
    Certificates can play a critical role in enabling and controlling access for users and devices to our sensitive business processes and data. Our hosts are joined once again by David Colon as we explore the role certificates play in providing network access and permissions, including some best practices.
  • Root Causes Episode 72: Future-Proofing Your PKI Recorded: May 14 2021 35 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Mitch Ashley, CEO of Accelerated Strategies Group
    Former CableLabs CIO and Kyrio President and General Manager Mitch Ashley joins our hosts to discuss how to set up a PKI system that will meet your needs for many years to come. Mitch is now CEO of Accelerated Strategies Group, a disruptive analyst firm focused on cybersecurity, devops and cloud. We discuss the differing attitudes, pain points, and processes of device manufacturers versus service providers. Mitch explains how the overall qualities of the ecosystem affect PKI, ensuring extensibility and auditability, and how to project your PKI needs into the future ten or twenty years from today.
  • Root Causes Episode 71: Short Lived DevOps Certificates Recorded: May 12 2021 22 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
    Repeat guest and DevOps expert David Colon joins us again to discuss identity for microservices, including the use of very short-lived TLS certificates. David and our hosts explore the unique properties of PKI in these environments and describe how to find the optimal term for a container certificate.
  • Root Causes Episode 70: Identity Is the New Perimeter Recorded: May 10 2021 28 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    Modern architectures and development processes have shattered the old concept of an IT perimeter for the enterprise. In this world, attaching strong identity to every device, user, and process is essential to security. In this episode our hosts describe this challenge and discuss the pros and cons of various identity schemes.
  • Root Causes Episode 69: Fundamentals of DevOps and PKI Recorded: May 7 2021 23 mins
    Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
    In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI. We explore how PKI fits in with orchestration engines like Kubernetes and some of the practical considerations in securely using keys in such environments.
  • Root Causes Episode 68: Why SHA - 1 Is No Longer Secure Recorded: May 5 2021 32 mins
    Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
    SHA-1 was a cornerstone of the early secure web. Now, 25 years later, this hashing function is no longer secure. Join our hosts to hear the history of SHA-1, its common use cases, and the properties of an effective hashing function. Learn about collision attacks and why they matter. Find out the reasons SHA-1 is still in use and why it is no longer secure in today's computing world.
PKI and Security webinars for IT professionals
We are the world's largest commercial SSL Certificate Authority. Our webinars are specially designed to help you protect your online business, connected devices, applications, and digital identities.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Root Causes Episode 86: SSH Keys
  • Live at: Jun 2 2021 2:10 pm
  • Presented by: Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & David Colon, Senior DevOps Engineer at Sectigo
  • From:
Your email has been sent.
or close