<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/GmfATUT8" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Root Causes: A PKI and Security Podcast</title>
    <description>Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today&apos;s dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject matter expert) will help you stay current on developments in this essential technology platform and to understand the whys and wherefores of popular Public Key Infrastructures.</description>
    <copyright>All rights reserved</copyright>
    <language>en</language>
    <pubDate>Wed, 15 Apr 2026 13:54:43 +0000</pubDate>
    <lastBuildDate>Wed, 15 Apr 2026 13:54:55 +0000</lastBuildDate>
    <image>
      <link>https://soundcloud.com/tim-callan</link>
      <title>Root Causes: A PKI and Security Podcast</title>
      <url>https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/8689138d-80e5-4d31-8359-ffe3c984bb55/3000x3000/root_causes_logo.jpg?aid=rss_feed</url>
    </image>
    <link>https://soundcloud.com/tim-callan</link>
    <itunes:summary>Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today&apos;s dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject matter expert) will help you stay current on developments in this essential technology platform and to understand the whys and wherefores of popular Public Key Infrastructures.</itunes:summary>
    <itunes:author>Tim Callan and Jason Soroko</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/8689138d-80e5-4d31-8359-ffe3c984bb55/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/GmfATUT8</itunes:new-feed-url>
    <itunes:owner>
      <itunes:name>Tim Callan Jason Soroko</itunes:name>
      <itunes:email>tim.callan@sectigo.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:category text="Science"/>
    <item>
      <guid isPermaLink="false">19e43b6c-effb-4576-9911-58620268a666</guid>
      <title>Root Causes 605: Chrome Declares Its Support for Merkle Tree Certificates (MTC)</title>
      <description><![CDATA[Google has taken a strong position supporting Merkle Tree Certificates (MTC) as the PQC-enabled future for SSL / TLS. We unpack this extremely important position from the WebPKI's most influential organization. 
]]></description>
      <pubDate>Wed, 15 Apr 2026 13:54:43 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="8917620" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4d7fcb60-1048-4a3b-baf6-2d25bef3a018/group-item/6db8e17e-507a-43be-beeb-4aa4cac04323/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 605: Chrome Declares Its Support for Merkle Tree Certificates (MTC)</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/c3f7775c-1c62-40a7-98a8-ce97f70e7501/3000x3000/605.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:17</itunes:duration>
      <itunes:summary>Google has taken a strong position supporting Merkle Tree Certificates (MTC) as the PQC-enabled future for SSL / TLS. We unpack this extremely important position from the WebPKI&apos;s most influential organization.</itunes:summary>
      <itunes:subtitle>Google has taken a strong position supporting Merkle Tree Certificates (MTC) as the PQC-enabled future for SSL / TLS. We unpack this extremely important position from the WebPKI&apos;s most influential organization.</itunes:subtitle>
      <itunes:keywords>ssl / tls, merkle tree certificates (mtc), post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>605</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d1a0f6e6-2acd-483a-bd99-776d3e58cded</guid>
      <title>Root Causes 604: Accelerated Timeline for Quantum Computers Breaking ECC in Crypto and Blockchain</title>
      <description><![CDATA[A new paper from Google Quantum AI and others documents a new technique for breaking ECC, particularly the curve protecting crypto currencies, smart contracts, and blockchain.  This accelerates post quantum cryptography (PQC) timelines. 
]]></description>
      <pubDate>Mon, 13 Apr 2026 14:56:56 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="10706903" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/3c7f67d8-c3bf-4a94-88a5-84176222a75f/group-item/5a61038e-4ac5-49c4-b6ff-fc02fa4b2d29/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 604: Accelerated Timeline for Quantum Computers Breaking ECC in Crypto and Blockchain</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/2df9c453-64b5-4f6b-b228-3f491c767a0e/3000x3000/6043000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:09</itunes:duration>
      <itunes:summary>A new paper from Google Quantum AI and others documents a new technique for breaking ECC, particularly the curve protecting crypto currencies, smart contracts, and blockchain.  This accelerates post quantum cryptography (PQC) timelines.</itunes:summary>
      <itunes:subtitle>A new paper from Google Quantum AI and others documents a new technique for breaking ECC, particularly the curve protecting crypto currencies, smart contracts, and blockchain.  This accelerates post quantum cryptography (PQC) timelines.</itunes:subtitle>
      <itunes:keywords>blockchain, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>604</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9593d1f8-dba2-4a6a-8f9d-930fefd5118d</guid>
      <title>Root Causes 603: Cryptographically Relevant Quantum Computing (CRQC) with Only 10,000 Qubits</title>
      <description><![CDATA[New research suggests that a cryptographically relevant quantum computer is achievable with only 10,000 qubits. This was an important contributor to Google moving its PQC target to 2029. 
]]></description>
      <pubDate>Fri, 10 Apr 2026 19:09:26 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="9060562" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/8449826a-d3a6-4ae3-ae00-deb3e4f71ce3/group-item/4325c1d1-82f2-4ae2-9369-504a8871c85a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 603: Cryptographically Relevant Quantum Computing (CRQC) with Only 10,000 Qubits</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/7e362898-4351-4364-a2c6-47e0420b0597/3000x3000/6033000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:26</itunes:duration>
      <itunes:summary>New research suggests that a cryptographically relevant quantum computer is achievable with only 10,000 qubits. This was an important contributor to Google moving its PQC target to 2029.</itunes:summary>
      <itunes:subtitle>New research suggests that a cryptographically relevant quantum computer is achievable with only 10,000 qubits. This was an important contributor to Google moving its PQC target to 2029.</itunes:subtitle>
      <itunes:keywords>crqc, pki, cryptography, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>603</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5e22447c-2490-45df-bda4-828b6c4a3fb9</guid>
      <title>Root Causes 602: Google Moves the PQC Date Forward to 2029</title>
      <description><![CDATA[Google has announced that it is moving its target for full PQC support to 2029.  This is a strong statement from one of the most knowledgeable PQC technology companies that the existing 2030 target is too late. 
]]></description>
      <pubDate>Wed, 8 Apr 2026 15:21:06 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="12474034" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/340b4dbe-3374-4f16-a7ce-c6fee84804a5/group-item/55886d03-75dd-4f06-a9da-78994c6178e1/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 602: Google Moves the PQC Date Forward to 2029</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/068d4212-a802-4896-a2bb-4044558466d5/3000x3000/602.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:59</itunes:duration>
      <itunes:summary>Google has announced that it is moving its target for full PQC support to 2029.  This is a strong statement from one of the most knowledgeable PQC technology companies that the existing 2030 target is too late.</itunes:summary>
      <itunes:subtitle>Google has announced that it is moving its target for full PQC support to 2029.  This is a strong statement from one of the most knowledgeable PQC technology companies that the existing 2030 target is too late.</itunes:subtitle>
      <itunes:keywords>pki, cryptography, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>602</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5d702f2f-375c-4f5d-a8bd-876bc2607f8b</guid>
      <title>Root Causes 601: The Zombie in the Server Room</title>
      <description><![CDATA[Legacy PKI implementations in the enterprise are holding back technical progress and creating security risk.  We discuss reasons why, consequences, and what to do about it. 
]]></description>
      <pubDate>Mon, 6 Apr 2026 13:22:08 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="6573705" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/a78ffd4f-34fe-41f4-8097-1806256ba521/group-item/c89e8877-d3b3-49dc-94de-37bec4c7c73c/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 601: The Zombie in the Server Room</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/e4d6ba8a-3476-4124-9357-b7a5a602454c/3000x3000/601.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:50</itunes:duration>
      <itunes:summary>Legacy PKI implementations in the enterprise are holding back technical progress and creating security risk.  We discuss reasons why, consequences, and what to do about it.</itunes:summary>
      <itunes:subtitle>Legacy PKI implementations in the enterprise are holding back technical progress and creating security risk.  We discuss reasons why, consequences, and what to do about it.</itunes:subtitle>
      <itunes:keywords>pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>601</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b2264648-a5d2-48ef-a438-be700a32b123</guid>
      <title>Root Causes 600: Cryptographic Design Is Not Neutral</title>
      <description><![CDATA[In our previous episode we defined cryptography as the new geopolitics.  Now in our 600th episode we follow up to explain how all cryptographic decisions reflect the social, political, and legal viewpoints of the cryptography's designers. 
]]></description>
      <pubDate>Fri, 3 Apr 2026 12:11:41 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="9911527" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/e109bd4d-5f2f-4a65-b7bb-f7ac4977f445/group-item/f1d96ad5-c7a6-49d8-bdcc-5f0a7f98bedb/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 600: Cryptographic Design Is Not Neutral</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/359668bd-bff7-4b06-97c7-e70e541d6b12/3000x3000/6003000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:19</itunes:duration>
      <itunes:summary>In our previous episode we defined cryptography as the new geopolitics.  Now in our 600th episode we follow up to explain how all cryptographic decisions reflect the social, political, and legal viewpoints of the cryptography&apos;s designers.</itunes:summary>
      <itunes:subtitle>In our previous episode we defined cryptography as the new geopolitics.  Now in our 600th episode we follow up to explain how all cryptographic decisions reflect the social, political, and legal viewpoints of the cryptography&apos;s designers.</itunes:subtitle>
      <itunes:keywords>pki, cryptography</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>600</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">23f7d75b-929c-4323-992f-bf5b09d6185f</guid>
      <title>Root Causes 599: Cryptography Is the New Geopolitics</title>
      <description><![CDATA[In the last decade or so, nations around the world have become keenly determined to use cryptography for their own legal, economic, and military advantage.  We explore this concept. 
]]></description>
      <pubDate>Wed, 1 Apr 2026 13:44:18 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="10231683" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/a070ff6a-ce34-4d2b-a081-5274022f6c03/group-item/b13eb166-6090-4f28-8059-f180e2de9d38/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 599: Cryptography Is the New Geopolitics</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/6a70b688-6514-4768-9ac5-9669831c1c86/3000x3000/5993000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:39</itunes:duration>
      <itunes:summary>In the last decade or so, nations around the world have become keenly determined to use cryptography for their own legal, economic, and military advantage.  We explore this concept.</itunes:summary>
      <itunes:subtitle>In the last decade or so, nations around the world have become keenly determined to use cryptography for their own legal, economic, and military advantage.  We explore this concept.</itunes:subtitle>
      <itunes:keywords>pki, cryptography</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>599</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">950b1ea3-ded0-4bc7-a2d5-3b9af3f132ff</guid>
      <title>Root Causes 598: Why Johnny Can&apos;t authN in OT</title>
      <description><![CDATA[A recent CISA report declares that the nation's OT infrastructure is incapable of keeping up with the crypto agility and certificate management needs that modern security demands.  We examine this finding. 
]]></description>
      <pubDate>Mon, 30 Mar 2026 17:25:50 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="7602720" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7cec18ae-b2ee-4e84-ae20-58e16b4cce50/group-item/ebbbe410-af46-46dc-a524-811aa77b351c/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 598: Why Johnny Can&apos;t authN in OT</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/590162e7-0da9-4a10-bc34-fb066d7a29ad/3000x3000/598.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:55</itunes:duration>
      <itunes:summary>A recent CISA report declares that the nation&apos;s OT infrastructure is incapable of keeping up with the crypto agility and certificate management needs that modern security demands.  We examine this finding.</itunes:summary>
      <itunes:subtitle>A recent CISA report declares that the nation&apos;s OT infrastructure is incapable of keeping up with the crypto agility and certificate management needs that modern security demands.  We examine this finding.</itunes:subtitle>
      <itunes:keywords>security, pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>598</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b06362c5-f1d5-46f2-87f0-13ebda5dd3ef</guid>
      <title>Root Causes 597: If You Don&apos;t Hold the Keys, You Don&apos;t Hold the Subpoenas</title>
      <description><![CDATA[Microsoft has publicly stated that it will hand over Bitlocker keys to US law enforcement agencies without requiring a subpoena or court order. These keys can be held by users rather than Microsoft, at their option. We dive into this topic. 
]]></description>
      <pubDate>Fri, 27 Mar 2026 14:47:05 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="7140875" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/0447f90b-621d-4d49-ab3d-d15a1f98544a/group-item/3975e525-1fe8-4fc0-86f9-72e344240f4a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 597: If You Don&apos;t Hold the Keys, You Don&apos;t Hold the Subpoenas</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/d6947449-af34-4755-8698-39f01002490d/3000x3000/597.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:26</itunes:duration>
      <itunes:summary>Microsoft has publicly stated that it will hand over Bitlocker keys to US law enforcement agencies without requiring a subpoena or court order. These keys can be held by users rather than Microsoft, at their option. We dive into this topic.</itunes:summary>
      <itunes:subtitle>Microsoft has publicly stated that it will hand over Bitlocker keys to US law enforcement agencies without requiring a subpoena or court order. These keys can be held by users rather than Microsoft, at their option. We dive into this topic.</itunes:subtitle>
      <itunes:keywords>pki, encryption</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>597</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5495476b-4373-4b34-9b55-b44c247b969c</guid>
      <title>Root Causes 596: CLM and Operational Uptime</title>
      <description><![CDATA[We usually think of Certificate Lifecycle Management (CLM) as a security category. But we could equally well categorize it as an operations category that enables uptime. In this episode we make our case.  
]]></description>
      <pubDate>Wed, 25 Mar 2026 13:21:18 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="6459184" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/d3337d34-3e78-4969-8cd9-3843b7ea0e69/group-item/5d8726bd-caee-4e91-a10f-06f5edd8991e/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 596: CLM and Operational Uptime</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/9e3ef2b7-9d22-45fa-a1d1-b3ee5ed1000c/3000x3000/596.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:43</itunes:duration>
      <itunes:summary>We usually think of Certificate Lifecycle Management (CLM) as a security category. But we could equally well categorize it as an operations category that enables uptime. In this episode we make our case. </itunes:summary>
      <itunes:subtitle>We usually think of Certificate Lifecycle Management (CLM) as a security category. But we could equally well categorize it as an operations category that enables uptime. In this episode we make our case. </itunes:subtitle>
      <itunes:keywords>certificate lifecycle management, clm</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>596</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d447100-dade-45d2-83f2-c269f12a6d6d</guid>
      <title>Root Causes 595: What Is a Digital Parasite?</title>
      <description><![CDATA[We introduce the concept of a "digital parasite," explaining why this attack philosophy appears to be on the rise. 
]]></description>
      <pubDate>Mon, 23 Mar 2026 13:42:55 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="12002158" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/3a7ee026-eb61-40f0-ba78-47cb7d709b03/group-item/4bfdb735-0182-4511-a0ef-6c0c36c67682/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 595: What Is a Digital Parasite?</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/635c4561-681b-4c3c-b06d-a04b5a562afc/3000x3000/595.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:30</itunes:duration>
      <itunes:summary>We introduce the concept of a &quot;digital parasite,&quot; explaining why this attack philosophy appears to be on the rise.</itunes:summary>
      <itunes:subtitle>We introduce the concept of a &quot;digital parasite,&quot; explaining why this attack philosophy appears to be on the rise.</itunes:subtitle>
      <itunes:keywords>security, pki, ransomware</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>595</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6101dcb8-b004-45bc-8414-c46c22f2a4ae</guid>
      <title>Root Causes 594: Google&apos;s Five PQC Recommendations for Policy Makers</title>
      <description><![CDATA[In a recent blog post Google made five recommendations for policy makers.  We walk down the list. 
]]></description>
      <pubDate>Wed, 18 Mar 2026 21:04:04 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16279971" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/192b0ad3-f9e0-4d29-8995-6b5d08bdbb76/group-item/6249c8b7-141f-4e60-b8e0-5db1660a8bb6/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 594: Google&apos;s Five PQC Recommendations for Policy Makers</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/67d87f0b-c26c-441f-868f-6096644ebd7d/3000x3000/594.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:57</itunes:duration>
      <itunes:summary>In a recent blog post Google made five recommendations for policy makers.  We walk down the list.</itunes:summary>
      <itunes:subtitle>In a recent blog post Google made five recommendations for policy makers.  We walk down the list.</itunes:subtitle>
      <itunes:keywords>pki, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>594</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">155af289-cf61-4459-85b8-0f910a201726</guid>
      <title>Root Causes 593: New PQC Guidance from CISA</title>
      <description><![CDATA[CISA (Cybersecurity and Infrastructure Security Agency) has released new guidance about post-quantum cryptography in critical infrastructure, including some very sobering warnings. We go into the details. 
]]></description>
      <pubDate>Mon, 16 Mar 2026 09:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16279971" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/6a8a5930-d330-4c1f-baf7-b7cca7fd9ce9/group-item/20bf7464-b820-4b0c-9896-bcd5e988f492/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 593: New PQC Guidance from CISA</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/af885f07-9307-4fe3-a68f-cbff4b1f4895/3000x3000/5933x3.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:57</itunes:duration>
      <itunes:summary>CISA (Cybersecurity and Infrastructure Security Agency) has released new guidance about post-quantum cryptography in critical infrastructure, including some very sobering warnings. We go into the details.</itunes:summary>
      <itunes:subtitle>CISA (Cybersecurity and Infrastructure Security Agency) has released new guidance about post-quantum cryptography in critical infrastructure, including some very sobering warnings. We go into the details.</itunes:subtitle>
      <itunes:keywords>pki, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>593</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d58fda5-6e60-4f82-afc7-60a078a4b2ab</guid>
      <title>Root Causes 592: When a CAA Record Outlives the CA</title>
      <description><![CDATA[CAA records exist to restrict issuing CAs for a given domain to as few as one CA. But what happens when the CAA record outlives the CA to which it restricts issuance? Join us to find out. 
]]></description>
      <pubDate>Fri, 13 Mar 2026 08:20:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="8391827" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/afc405ac-a656-4adf-8d87-6bc5f0728b4c/group-item/054074fd-109c-4ccd-a187-ef3e479db961/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 592: When a CAA Record Outlives the CA</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ae297de3-425d-42b4-841c-3bf770f71fe5/3000x3000/2.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:44</itunes:duration>
      <itunes:summary>CAA records exist to restrict issuing CAs for a given domain to as few as one CA. But what happens when the CAA record outlives the CA to which it restricts issuance? Join us to find out.</itunes:summary>
      <itunes:subtitle>CAA records exist to restrict issuing CAs for a given domain to as few as one CA. But what happens when the CAA record outlives the CA to which it restricts issuance? Join us to find out.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>592</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d9586e7-7e6e-4cd8-979d-6d6923e3e79b</guid>
      <title>Root Causes 591: Client Authentication Deprecation Date Moves Out</title>
      <description><![CDATA[Chrome's deadline for deprecation of the clientAuth EKU and mTLS in public certificates has moved out.  We give you the what, when, and why. 
]]></description>
      <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="11315008" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/6b3fc974-c220-4c70-b88a-dfc58b19b476/group-item/bbde2c98-52cb-4440-aa85-f22cc33237c5/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 591: Client Authentication Deprecation Date Moves Out</itunes:title>
      <itunes:author>Tim Callan Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/cfd97f4f-3c44-4983-b965-081da350fd1c/3000x3000/5913000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:46</itunes:duration>
      <itunes:summary>Chrome&apos;s deadline for deprecation of the clientAuth EKU and mTLS in public certificates has moved out.  We give you the what, when, and why.</itunes:summary>
      <itunes:subtitle>Chrome&apos;s deadline for deprecation of the clientAuth EKU and mTLS in public certificates has moved out.  We give you the what, when, and why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>591</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f061afd8-82ba-464a-9c5a-51d8e42dface</guid>
      <title>Root Causes 590: The Size of the CA Is Not the Size of the Risk</title>
      <description><![CDATA[It would be easy to believe that the amount of risk posed to the WebPKI by any individual public CA is somehow proportional to the number of active certificates that CA has.  This is false, however.  In this episode we address this misconception. 
]]></description>
      <pubDate>Tue, 10 Mar 2026 01:05:31 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="7031761" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/8cebe1f2-f69d-4454-ba5b-e34d71808b00/group-item/b3b4dcd4-722d-4282-b967-0c5cdd58e2a5/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 590: The Size of the CA Is Not the Size of the Risk</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/902f3049-6a05-4459-ba3c-175953cf044d/3000x3000/590.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:19</itunes:duration>
      <itunes:summary>It would be easy to believe that the amount of risk posed to the WebPKI by any individual public CA is somehow proportional to the number of active certificates that CA has.  This is false, however.  In this episode we address this misconception.</itunes:summary>
      <itunes:subtitle>It would be easy to believe that the amount of risk posed to the WebPKI by any individual public CA is somehow proportional to the number of active certificates that CA has.  This is false, however.  In this episode we address this misconception.</itunes:subtitle>
      <itunes:keywords>digital certificates, pki, webpki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>590</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbc77048-8288-4f54-9cdc-9335755a1506</guid>
      <title>Root Causes 589: Is a Cryptographically Relevant Quantum Computer Economically Viable?</title>
      <description><![CDATA[We recently heard the argument that it's simply too expensive to develop a cryptographically relevant quantum computer. We vehemently disagree. In this episode we explain why. 
]]></description>
      <pubDate>Fri, 6 Mar 2026 16:45:05 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="9207683" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/ba5fd5dd-fa75-4c16-9371-d00eb48d8434/group-item/5fe44ca3-3b8c-4a84-83bc-0b4ba90a3407/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 589: Is a Cryptographically Relevant Quantum Computer Economically Viable?</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/7eb80297-a832-4a29-872b-43c7db8d8328/3000x3000/crqc.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:35</itunes:duration>
      <itunes:summary>We recently heard the argument that it&apos;s simply too expensive to develop a cryptographically relevant quantum computer. We vehemently disagree. In this episode we explain why.</itunes:summary>
      <itunes:subtitle>We recently heard the argument that it&apos;s simply too expensive to develop a cryptographically relevant quantum computer. We vehemently disagree. In this episode we explain why.</itunes:subtitle>
      <itunes:keywords>pki, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>589</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3dc4b1a2-4497-4b0b-9d8c-9d60ac1b3a61</guid>
      <title>Root Causes 588: It&apos;s Cryptographic Frogger from Here on Out</title>
      <description><![CDATA[In this episode Tim explains that the transition to PQC is not just a change in cryptographic algorithms but also a fundamental shift in how we treat our cryptography.  From here on out, IT systems need to be fundamentally crypto agile in a way we've never had to be before.  Cryptographic Agility is the key to solve this problem. 
]]></description>
      <pubDate>Wed, 4 Mar 2026 17:49:13 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="9521153" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4b308bba-63e0-4161-93c2-a2f61762b165/group-item/f94895d0-2a81-40cc-bcf4-24f07bb14ef4/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 588: It&apos;s Cryptographic Frogger from Here on Out</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/78b2fba7-f080-44f7-be2e-4a59c4087d93/5323f0e6-5ff9-4330-8cd9-f61e567537fe/3000x3000/frogger3x.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:55</itunes:duration>
      <itunes:summary>In this episode Tim explains that the transition to PQC is not just a change in cryptographic algorithms but also a fundamental shift in how we treat our cryptography.  From here on out, IT systems need to be fundamentally crypto agile in a way we&apos;ve never had to be before.  Cryptographic Agility is the key to solve this problem.</itunes:summary>
      <itunes:subtitle>In this episode Tim explains that the transition to PQC is not just a change in cryptographic algorithms but also a fundamental shift in how we treat our cryptography.  From here on out, IT systems need to be fundamentally crypto agile in a way we&apos;ve never had to be before.  Cryptographic Agility is the key to solve this problem.</itunes:subtitle>
      <itunes:keywords>cryptography, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>588</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">19149935-822e-4ae4-89ad-c03712b9640b</guid>
      <title>Root Causes 587: AI Orchestration for Attackers</title>
      <description><![CDATA[<p>YouTube video version of this episode<br>
 https://youtu.be/-wMy3rPV1Lg</p>
]]></description>
      <pubDate>Mon, 2 Mar 2026 17:47:58 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>YouTube video version of this episode<br>
 https://youtu.be/-wMy3rPV1Lg</p>
]]></content:encoded>
      <enclosure length="10489982" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/91a022fc-fffa-40b7-9479-980a85afeedd/group-item/5c93aeec-491f-480b-8c53-e118b2742cca/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 587: AI Orchestration for Attackers</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/daba4b82-1fa0-48f1-95f6-5949409ba69d/3000x3000/572.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:55</itunes:duration>
      <itunes:summary>Jason describes a recent intrusion almost entirely operated by off-the-shelf AI tools.  This is an important milestone in security.  We describe its potential consequences.</itunes:summary>
      <itunes:subtitle>Jason describes a recent intrusion almost entirely operated by off-the-shelf AI tools.  This is an important milestone in security.  We describe its potential consequences.</itunes:subtitle>
      <itunes:keywords>ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>587</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fe886c96-068e-47f4-85d4-18086b85fd81</guid>
      <title>Root Causes 586: Beyond Harvest Now Decrypt Later</title>
      <description><![CDATA[We expand on the concept of trust-now-forge-later to list a whole bevy of additional attacks that eventually will be enabled by cryptographically relevant quantum computers. 
]]></description>
      <pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/4b46def6-0346-449e-a794-dcff3c51d329/rc_586.jpg" width="1280"/>
      <enclosure length="8317430" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/a8a4fafb-c0be-4aaa-b927-90dc2a9d119b/group-item/b31639ec-7247-4078-b594-74bc7aa1f926/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 586: Beyond Harvest Now Decrypt Later</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9801cceb-1077-4f92-a6d3-0cfa79b42dcb/3000x3000/rc_5862.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:39</itunes:duration>
      <itunes:summary>We expand on the concept of trust-now-forge-later to list a whole bevy of additional attacks that eventually will be enabled by cryptographically relevant quantum computers.</itunes:summary>
      <itunes:subtitle>We expand on the concept of trust-now-forge-later to list a whole bevy of additional attacks that eventually will be enabled by cryptographically relevant quantum computers.</itunes:subtitle>
      <itunes:keywords>security, pki, post quantum cryptography (pqc)</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>586</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ddafde8b-ad4b-42ae-9245-28c2fcc37993</guid>
      <title>Root Causes 585: The Cryptographic Inventory Manifesto</title>
      <description><![CDATA[We all love a good manifesto! Jason spells out the ten principles of the Cryptographic Inventory Manifesto, and we discuss. 
]]></description>
      <pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/8e61fddf-e424-42ef-bb3b-af8b1010858f/cim.jpg" width="1280"/>
      <enclosure length="8558593" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/f155fa1b-65bb-4aa9-9182-a4adbf312479/group-item/e635869a-e793-4e4f-9525-6d4219bfe860/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 585: The Cryptographic Inventory Manifesto</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/31beef2f-beb3-4b62-beec-24c47ebcf73a/3000x3000/cim.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:54</itunes:duration>
      <itunes:summary>We all love a good manifesto! Jason spells out the ten principles of the Cryptographic Inventory Manifesto, and we discuss.</itunes:summary>
      <itunes:subtitle>We all love a good manifesto! Jason spells out the ten principles of the Cryptographic Inventory Manifesto, and we discuss.</itunes:subtitle>
      <itunes:keywords>digital certificates, cybersecurity, cryptographic inventory, cryptography, pqc</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>585</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b2b5c67f-8c87-422c-859e-11733e3b3b83</guid>
      <title>Root Causes 584: Mapping DORA to CLM</title>
      <description><![CDATA[We look at the new European DORA and NIS2 regulations and how Certificate Lifecycle Management is a key requirement to meet these requirements. You will be surprised how explicit these requirements are. 
]]></description>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/97cb04d7-df3c-48ae-a9c5-c97f6695a80f/rc_584.png" width="1280"/>
      <enclosure length="19815044" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/43553683-512e-4e42-aeb1-33d97f900fac/group-item/52940118-0d7f-4f56-abb7-cfa24e42f288/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 584: Mapping DORA to CLM</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/3fd8462b-461f-4968-aace-8efbb62731da/3000x3000/rc_584.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:38</itunes:duration>
      <itunes:summary>We look at the new European DORA and NIS2 regulations and how Certificate Lifecycle Management is a key requirement to meet these requirements. You will be surprised how explicit these requirements are.</itunes:summary>
      <itunes:subtitle>We look at the new European DORA and NIS2 regulations and how Certificate Lifecycle Management is a key requirement to meet these requirements. You will be surprised how explicit these requirements are.</itunes:subtitle>
      <itunes:keywords>pki, dora, european standard, certificate lifecycle management, certificate lifespans</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>584</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3108d037-52b8-488a-9bd3-bf1c3c79e2e9</guid>
      <title>Root Causes 583: AI Versus ECC P 256</title>
      <description><![CDATA[<p>Recorded in Ottawa Ontario.</p>
]]></description>
      <pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recorded in Ottawa Ontario.</p>
]]></content:encoded>
      <enclosure length="10426568" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/9d9b8294-8b88-45db-900a-a38762e0d429/group-item/a8c773ee-2ee2-4fde-b349-65a0ef69dced/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 583: AI Versus ECC P 256</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/b4e192f2-0460-48af-9c85-279c44504847/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:51</itunes:duration>
      <itunes:summary>In an innovative application, an AI has been used to find private keys for ECC (Elliptic Curve Cryptography) P 256. We explain how.</itunes:summary>
      <itunes:subtitle>In an innovative application, an AI has been used to find private keys for ECC (Elliptic Curve Cryptography) P 256. We explain how.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>583</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2268884726</guid>
      <title>Root Causes 582: New Research Drastically Cuts Number of Qubits for Cryptographic Relevance</title>
      <description><![CDATA[<p>New research indicates that the number of qubits necessary to achieve cryptographic relevance has reduced by two orders of magnitude.  We cover this breaking news and its implications.</p>
]]></description>
      <pubDate>Tue, 17 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>New research indicates that the number of qubits necessary to achieve cryptographic relevance has reduced by two orders of magnitude.  We cover this breaking news and its implications.</p>
]]></content:encoded>
      <enclosure length="13635645" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7ec1afd2-fec3-4fec-9c22-5c161066efe1/audio/b45d4fed-5d62-4e09-a967-206337234da6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 582: New Research Drastically Cuts Number of Qubits for Cryptographic Relevance</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7ec1afd2-fec3-4fec-9c22-5c161066efe1/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:14:11</itunes:duration>
      <itunes:summary>New research indicates that the number of qubits necessary to achieve cryptographic relevance has reduced by two orders of magnitude.  We cover this breaking news and its implications.</itunes:summary>
      <itunes:subtitle>New research indicates that the number of qubits necessary to achieve cryptographic relevance has reduced by two orders of magnitude.  We cover this breaking news and its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>499</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2267697077</guid>
      <title>Root Causes 581: A Timeline for Deprecation of Manual DCV Methods</title>
      <description><![CDATA[<p>By CABF ballot all manual methods of Domain Control Validation (DCV) will be deprecated by 2028.  We explain which methods are due for deprecation and when.</p>
]]></description>
      <pubDate>Sun, 15 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>By CABF ballot all manual methods of Domain Control Validation (DCV) will be deprecated by 2028.  We explain which methods are due for deprecation and when.</p>
]]></content:encoded>
      <enclosure length="12624812" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cdc13be5-f463-47f5-8677-5f1c0e1c6b44/audio/98661d18-c9d9-4d5f-860e-5c96a676d08d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 581: A Timeline for Deprecation of Manual DCV Methods</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cdc13be5-f463-47f5-8677-5f1c0e1c6b44/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:09</itunes:duration>
      <itunes:summary>By CABF ballot all manual methods of Domain Control Validation (DCV) will be deprecated by 2028.  We explain which methods are due for deprecation and when.</itunes:summary>
      <itunes:subtitle>By CABF ballot all manual methods of Domain Control Validation (DCV) will be deprecated by 2028.  We explain which methods are due for deprecation and when.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>498</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2266121072</guid>
      <title>Root Causes 580: Top Use Cases for Hybrid Certificates</title>
      <description><![CDATA[<p>We go over the qualities in abstract of a use case that strongly invites the use of hybrid certificates and then run down a list of specific use cases that meet these criteria.  This includes OT systems, code signing, secure boot, WiFi, enterprise S/MIME, and more.</p>
]]></description>
      <pubDate>Fri, 13 Feb 2026 20:01:25 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We go over the qualities in abstract of a use case that strongly invites the use of hybrid certificates and then run down a list of specific use cases that meet these criteria.  This includes OT systems, code signing, secure boot, WiFi, enterprise S/MIME, and more.</p>
]]></content:encoded>
      <enclosure length="12285356" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0e89a5cc-a2e7-40ad-9385-b60780419c66/audio/63b9cc81-7024-4979-b1cc-38a5293a9a9c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 580: Top Use Cases for Hybrid Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0e89a5cc-a2e7-40ad-9385-b60780419c66/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:47</itunes:duration>
      <itunes:summary>We go over the qualities in abstract of a use case that strongly invites the use of hybrid certificates and then run down a list of specific use cases that meet these criteria.  This includes OT systems, code signing, secure boot, WiFi, enterprise S/MIME, and more.</itunes:summary>
      <itunes:subtitle>We go over the qualities in abstract of a use case that strongly invites the use of hybrid certificates and then run down a list of specific use cases that meet these criteria.  This includes OT systems, code signing, secure boot, WiFi, enterprise S/MIME, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>497</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2264552567</guid>
      <title>Root Causes 579: Make Cryptography Boring Again</title>
      <description><![CDATA[<p>In this episode Jason declares that we must make cryptography boring again.  We get into what that means and why it matters.</p>
]]></description>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode Jason declares that we must make cryptography boring again.  We get into what that means and why it matters.</p>
]]></content:encoded>
      <enclosure length="17033132" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/821e7ea9-05d9-43a2-9ce2-0976f65a2b3e/audio/81400334-5b43-498f-8604-3b983eb683e7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 579: Make Cryptography Boring Again</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/821e7ea9-05d9-43a2-9ce2-0976f65a2b3e/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:44</itunes:duration>
      <itunes:summary>In this episode Jason declares that we must make cryptography boring again.  We get into what that means and why it matters.</itunes:summary>
      <itunes:subtitle>In this episode Jason declares that we must make cryptography boring again.  We get into what that means and why it matters.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>496</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2263198439</guid>
      <title>Root Causes 578: 200 Days Won&apos;t Actually Be 200 Days</title>
      <description><![CDATA[<p>We have seen much talk of the upcoming drop of maximum TLS term to 200 days, followed by 100 days, and eventually down to 47 days.  It happens that all those numbers are too large and the actual maxima will be less than that.  We explain.</p>
]]></description>
      <pubDate>Mon, 9 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We have seen much talk of the upcoming drop of maximum TLS term to 200 days, followed by 100 days, and eventually down to 47 days.  It happens that all those numbers are too large and the actual maxima will be less than that.  We explain.</p>
]]></content:encoded>
      <enclosure length="9770924" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/da3ae33d-b000-4d21-8290-e3ab54a05c6f/audio/404b7923-20e5-4ad6-9feb-a409d7479cd6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 578: 200 Days Won&apos;t Actually Be 200 Days</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/da3ae33d-b000-4d21-8290-e3ab54a05c6f/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:10</itunes:duration>
      <itunes:summary>We have seen much talk of the upcoming drop of maximum TLS term to 200 days, followed by 100 days, and eventually down to 47 days.  It happens that all those numbers are too large and the actual maxima will be less than that.  We explain.</itunes:summary>
      <itunes:subtitle>We have seen much talk of the upcoming drop of maximum TLS term to 200 days, followed by 100 days, and eventually down to 47 days.  It happens that all those numbers are too large and the actual maxima will be less than that.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>495</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2261621081</guid>
      <title>Root Causes 577: All the Stuff That&apos;s Coming in March</title>
      <description><![CDATA[<p>March 2026 is due to be the most eventful month in the history of the WebPKI.  Join us as we go over all the many changes coming next month.</p>
]]></description>
      <pubDate>Fri, 6 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>March 2026 is due to be the most eventful month in the history of the WebPKI.  Join us as we go over all the many changes coming next month.</p>
]]></content:encoded>
      <enclosure length="9691052" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0efe313d-ddbb-405f-ba60-639d12a49164/audio/3124403a-f8f9-4f32-be8c-e7bfcb2adcd3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 577: All the Stuff That&apos;s Coming in March</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0efe313d-ddbb-405f-ba60-639d12a49164/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:05</itunes:duration>
      <itunes:summary>March 2026 is due to be the most eventful month in the history of the WebPKI.  Join us as we go over all the many changes coming next month.</itunes:summary>
      <itunes:subtitle>March 2026 is due to be the most eventful month in the history of the WebPKI.  Join us as we go over all the many changes coming next month.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>494</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2260204532</guid>
      <title>Root Causes 576: Jeffries Dumps Bitcoin Due to the Quantum Threat</title>
      <description><![CDATA[<p>A large investment firm divests from Bitcoin for fear of the quantum threat.</p>
]]></description>
      <pubDate>Wed, 4 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A large investment firm divests from Bitcoin for fear of the quantum threat.</p>
]]></content:encoded>
      <enclosure length="6577580" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d643d053-5a5a-4ffd-aaa0-eb33095d08ab/audio/8f854004-43e4-4c68-a625-e981ba85dd94/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 576: Jeffries Dumps Bitcoin Due to the Quantum Threat</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d643d053-5a5a-4ffd-aaa0-eb33095d08ab/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:06:51</itunes:duration>
      <itunes:summary>A large investment firm divests from Bitcoin for fear of the quantum threat.</itunes:summary>
      <itunes:subtitle>A large investment firm divests from Bitcoin for fear of the quantum threat.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>493</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2259001127</guid>
      <title>Root Causes 575: Shortening Certificate Term - All the Dates</title>
      <description><![CDATA[<p>Everybody knows about March 15 and the drop in maximum public TLS certificate term to 200 days.  But that only scratches the surface on key dates with this maximum term reduction.  Join us as we go over &quot;all the dates&quot; for TLS maximum term reduction.</p>
]]></description>
      <pubDate>Mon, 2 Feb 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Everybody knows about March 15 and the drop in maximum public TLS certificate term to 200 days.  But that only scratches the surface on key dates with this maximum term reduction.  Join us as we go over &quot;all the dates&quot; for TLS maximum term reduction.</p>
]]></content:encoded>
      <enclosure length="19991852" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5838e4b1-0aa4-4c61-9f0c-ca1f03f36f90/audio/df1599ab-6221-4952-9f55-1b7cdc2e06a0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 575: Shortening Certificate Term - All the Dates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5838e4b1-0aa4-4c61-9f0c-ca1f03f36f90/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:20:49</itunes:duration>
      <itunes:summary>Everybody knows about March 15 and the drop in maximum public TLS certificate term to 200 days.  But that only scratches the surface on key dates with this maximum term reduction.  Join us as we go over &quot;all the dates&quot; for TLS maximum term reduction.</itunes:summary>
      <itunes:subtitle>Everybody knows about March 15 and the drop in maximum public TLS certificate term to 200 days.  But that only scratches the surface on key dates with this maximum term reduction.  Join us as we go over &quot;all the dates&quot; for TLS maximum term reduction.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>492</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2257211948</guid>
      <title>Root Causes 574: 2025 Predictions Scorecard - Part 2</title>
      <description><![CDATA[<p>We score our 2025 predictions in this second of two parts.</p>
]]></description>
      <pubDate>Fri, 30 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We score our 2025 predictions in this second of two parts.</p>
]]></content:encoded>
      <enclosure length="18774188" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/31c8d0d1-3863-444c-9e67-7210ccd95af1/audio/6e551a88-dd35-449d-8c66-bbbd0647979c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 574: 2025 Predictions Scorecard - Part 2</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/31c8d0d1-3863-444c-9e67-7210ccd95af1/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:19:33</itunes:duration>
      <itunes:summary>We score our 2025 predictions in this second of two parts.</itunes:summary>
      <itunes:subtitle>We score our 2025 predictions in this second of two parts.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>491</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2255730848</guid>
      <title>Root Causes 573: 2025 Predictions Scorecard - Part 1</title>
      <description><![CDATA[<p>Every new year we make predictions for the year to come, and every year we go back and see how we did.  This is the first of two parts scoring our 2025 predictions.</p>
]]></description>
      <pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Every new year we make predictions for the year to come, and every year we go back and see how we did.  This is the first of two parts scoring our 2025 predictions.</p>
]]></content:encoded>
      <enclosure length="22392236" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3bad1e7d-37b7-48af-a075-956d46642ef9/audio/be2f85aa-848c-4f08-ab92-2928705df477/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 573: 2025 Predictions Scorecard - Part 1</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3bad1e7d-37b7-48af-a075-956d46642ef9/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:23:19</itunes:duration>
      <itunes:summary>Every new year we make predictions for the year to come, and every year we go back and see how we did.  This is the first of two parts scoring our 2025 predictions.</itunes:summary>
      <itunes:subtitle>Every new year we make predictions for the year to come, and every year we go back and see how we did.  This is the first of two parts scoring our 2025 predictions.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>490</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2254388483</guid>
      <title>Root Causes 572: Quality of Entropy</title>
      <description><![CDATA[<p>We discuss the idea that not all cryptographic entropy is equally &quot;random&quot; and potential consequences.</p>
]]></description>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss the idea that not all cryptographic entropy is equally &quot;random&quot; and potential consequences.</p>
]]></content:encoded>
      <enclosure length="8390828" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/25221c1d-efbb-4cfd-a0e6-f8010ca324f7/audio/4029aba9-3818-4ff7-9562-4d618f1f60ea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 572: Quality of Entropy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/25221c1d-efbb-4cfd-a0e6-f8010ca324f7/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:44</itunes:duration>
      <itunes:summary>We discuss the idea that not all cryptographic entropy is equally &quot;random&quot; and potential consequences.</itunes:summary>
      <itunes:subtitle>We discuss the idea that not all cryptographic entropy is equally &quot;random&quot; and potential consequences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>489</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2252801873</guid>
      <title>Root Causes 571: Will There Ever Be a Cryptographically Relevant Quantum Computer?</title>
      <description><![CDATA[<p>We discuss the idea that it might be impossible to actually create a cryptographically relevant quantum computer and weigh in on this idea.</p>
]]></description>
      <pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss the idea that it might be impossible to actually create a cryptographically relevant quantum computer and weigh in on this idea.</p>
]]></content:encoded>
      <enclosure length="8910380" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7d15f0fe-de0d-4d6b-9621-d9c663bc673f/audio/9bc97c26-4f43-4c5f-a4ad-2c6c8f2dfbf6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 571: Will There Ever Be a Cryptographically Relevant Quantum Computer?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7d15f0fe-de0d-4d6b-9621-d9c663bc673f/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:16</itunes:duration>
      <itunes:summary>We discuss the idea that it might be impossible to actually create a cryptographically relevant quantum computer and weigh in on this idea.</itunes:summary>
      <itunes:subtitle>We discuss the idea that it might be impossible to actually create a cryptographically relevant quantum computer and weigh in on this idea.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>488</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2251593371</guid>
      <title>Root Causes 570: PQC Readiness at the Boardroom Level</title>
      <description><![CDATA[<p>Repeat guest Chris McGrath shares what enterprises need to be doing now to stay on track for the NIST PQC deadline in 2030.</p>
]]></description>
      <pubDate>Wed, 21 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Chris McGrath shares what enterprises need to be doing now to stay on track for the NIST PQC deadline in 2030.</p>
]]></content:encoded>
      <enclosure length="11665580" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/36f6e56d-6b16-49c3-9476-7652c9faef40/audio/2fa2e922-462d-4658-9928-3976aaa0d3b6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 570: PQC Readiness at the Boardroom Level</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/36f6e56d-6b16-49c3-9476-7652c9faef40/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:09</itunes:duration>
      <itunes:summary>Repeat guest Chris McGrath shares what enterprises need to be doing now to stay on track for the NIST PQC deadline in 2030.</itunes:summary>
      <itunes:subtitle>Repeat guest Chris McGrath shares what enterprises need to be doing now to stay on track for the NIST PQC deadline in 2030.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>487</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2250415505</guid>
      <title>Root Causes 569: New Regulations Are Changing the PKI Landscape</title>
      <description><![CDATA[<p>Repeat guest Chris McGrath joins us to discuss how increasingly strict regulations are requiring increased rigor, visibility, and auditability for enterprise digital certificates and PKI.</p>
]]></description>
      <pubDate>Mon, 19 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Chris McGrath joins us to discuss how increasingly strict regulations are requiring increased rigor, visibility, and auditability for enterprise digital certificates and PKI.</p>
]]></content:encoded>
      <enclosure length="9579692" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/354e7077-5aa9-4b41-b047-5cb39d715b19/audio/08237c66-9d52-43ff-9b72-85011daa7c95/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 569: New Regulations Are Changing the PKI Landscape</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/354e7077-5aa9-4b41-b047-5cb39d715b19/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:58</itunes:duration>
      <itunes:summary>Repeat guest Chris McGrath joins us to discuss how increasingly strict regulations are requiring increased rigor, visibility, and auditability for enterprise digital certificates and PKI.</itunes:summary>
      <itunes:subtitle>Repeat guest Chris McGrath joins us to discuss how increasingly strict regulations are requiring increased rigor, visibility, and auditability for enterprise digital certificates and PKI.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>486</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2248686086</guid>
      <title>Root Causes 568: Upping Your Certificate Game for Better Security</title>
      <description><![CDATA[<p>Senior cyber security advisor Chris McGrath joins us to discuss redefining digital certificates and their role in your organizational security profile, increasing regulation of certificates, and how enterprises can up their certificate game.</p>
]]></description>
      <pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Senior cyber security advisor Chris McGrath joins us to discuss redefining digital certificates and their role in your organizational security profile, increasing regulation of certificates, and how enterprises can up their certificate game.</p>
]]></content:encoded>
      <enclosure length="12087212" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9b28ab71-add9-4afa-8670-5e2ef6031827/audio/7e5b525a-dd3f-4c78-bade-c5d3b4946553/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 568: Upping Your Certificate Game for Better Security</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9b28ab71-add9-4afa-8670-5e2ef6031827/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:35</itunes:duration>
      <itunes:summary>Senior cyber security advisor Chris McGrath joins us to discuss redefining digital certificates and their role in your organizational security profile, increasing regulation of certificates, and how enterprises can up their certificate game.</itunes:summary>
      <itunes:subtitle>Senior cyber security advisor Chris McGrath joins us to discuss redefining digital certificates and their role in your organizational security profile, increasing regulation of certificates, and how enterprises can up their certificate game.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>485</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2247308873</guid>
      <title>Root Causes 567: Top 10 PQC Laggards in the Enterprise</title>
      <description><![CDATA[<p>We name the ten enterprise environments and use cases that are most likely to be late adopters of post quantum cryptography (PQC).</p>
]]></description>
      <pubDate>Wed, 14 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We name the ten enterprise environments and use cases that are most likely to be late adopters of post quantum cryptography (PQC).</p>
]]></content:encoded>
      <enclosure length="19918508" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e9e2fc7a-a6bc-4a29-9d84-7ae0467b8afd/audio/fe80ed8e-27ef-4173-a22d-cbccf1424079/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 567: Top 10 PQC Laggards in the Enterprise</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e9e2fc7a-a6bc-4a29-9d84-7ae0467b8afd/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:20:44</itunes:duration>
      <itunes:summary>We name the ten enterprise environments and use cases that are most likely to be late adopters of post quantum cryptography (PQC).</itunes:summary>
      <itunes:subtitle>We name the ten enterprise environments and use cases that are most likely to be late adopters of post quantum cryptography (PQC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>484</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2246257541</guid>
      <title>Root Causes 566: Time Is a Security Primitive</title>
      <description><![CDATA[<p>We discuss the foundational importance of time in PKI and security in general. This includes when things happen, the order in which things happen, and attacks based on time-spoofing.  We drill down on certificates, roots, timestamping, Certificate Transparency, patching, audits, and PQC.</p>
]]></description>
      <pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss the foundational importance of time in PKI and security in general. This includes when things happen, the order in which things happen, and attacks based on time-spoofing.  We drill down on certificates, roots, timestamping, Certificate Transparency, patching, audits, and PQC.</p>
]]></content:encoded>
      <enclosure length="11821100" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7179bef5-c7b3-4294-b53a-c8f738ef9b53/audio/fc9b0fc4-ef9e-4c5c-acef-ab62a45eb35b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 566: Time Is a Security Primitive</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7179bef5-c7b3-4294-b53a-c8f738ef9b53/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:18</itunes:duration>
      <itunes:summary>We discuss the foundational importance of time in PKI and security in general. This includes when things happen, the order in which things happen, and attacks based on time-spoofing.  We drill down on certificates, roots, timestamping, Certificate Transparency, patching, audits, and PQC.</itunes:summary>
      <itunes:subtitle>We discuss the foundational importance of time in PKI and security in general. This includes when things happen, the order in which things happen, and attacks based on time-spoofing.  We drill down on certificates, roots, timestamping, Certificate Transparency, patching, audits, and PQC.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>483</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2244697532</guid>
      <title>Root Causes 565: Our Response to QWAC Arguments - Part 3</title>
      <description><![CDATA[<p>In our concluding episode on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;compliance and interoperability.&quot;</p>
]]></description>
      <pubDate>Thu, 8 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our concluding episode on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;compliance and interoperability.&quot;</p>
]]></content:encoded>
      <enclosure length="11146028" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/05b5e803-9353-4b36-b2f1-53f2238c66a6/audio/76ca1e90-5f37-45fc-a106-d99a179ef9ac/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 565: Our Response to QWAC Arguments - Part 3</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/05b5e803-9353-4b36-b2f1-53f2238c66a6/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:36</itunes:duration>
      <itunes:summary>In our concluding episode on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;compliance and interoperability.&quot;</itunes:summary>
      <itunes:subtitle>In our concluding episode on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;compliance and interoperability.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>482</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2242233683</guid>
      <title>Root Causes 563: Our Response to QWAC Arguments - Part 1</title>
      <description><![CDATA[<p>As a follow up to our episode 546, we break down the first of three sets of arguments about QWACs and examine their level of validity.</p>
]]></description>
      <pubDate>Mon, 5 Jan 2026 21:07:02 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As a follow up to our episode 546, we break down the first of three sets of arguments about QWACs and examine their level of validity.</p>
]]></content:encoded>
      <enclosure length="15344300" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ee53bbdd-111c-4212-8d43-4a8390bd8349/audio/2e2460e1-d863-4e7d-a63e-704f8cb26e2c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 563: Our Response to QWAC Arguments - Part 1</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ee53bbdd-111c-4212-8d43-4a8390bd8349/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:15:58</itunes:duration>
      <itunes:summary>As a follow up to our episode 546, we break down the first of three sets of arguments about QWACs and examine their level of validity.</itunes:summary>
      <itunes:subtitle>As a follow up to our episode 546, we break down the first of three sets of arguments about QWACs and examine their level of validity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>481</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2243322119</guid>
      <title>Root Causes 564: Our Response to QWAC Arguments - Part 2</title>
      <description><![CDATA[<p>In our second of three episodes on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;governance and sovereignty.&quot;</p>
]]></description>
      <pubDate>Mon, 5 Jan 2026 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our second of three episodes on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;governance and sovereignty.&quot;</p>
]]></content:encoded>
      <enclosure length="10908332" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/eb01f659-7709-4dc9-a60b-c5cdbbb0bf0f/audio/1897a83a-d34b-4f23-ad37-958712e2aa00/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 564: Our Response to QWAC Arguments - Part 2</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/eb01f659-7709-4dc9-a60b-c5cdbbb0bf0f/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:21</itunes:duration>
      <itunes:summary>In our second of three episodes on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;governance and sovereignty.&quot;</itunes:summary>
      <itunes:subtitle>In our second of three episodes on the topic, we scrutinize arguments made for and against QWACs, this time focused on &quot;governance and sovereignty.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>480</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2238955376</guid>
      <title>Root Causes 562 : What Is a Side Oracle Attack?</title>
      <description><![CDATA[<p>You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.</p>
]]></description>
      <pubDate>Tue, 30 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.</p>
]]></content:encoded>
      <enclosure length="7635500" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7532f3a0-75c2-4e97-9004-5c1c58cff749/audio/dfa325c4-8eec-4ae1-b405-5f23ac6aa449/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 562 : What Is a Side Oracle Attack?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7532f3a0-75c2-4e97-9004-5c1c58cff749/3000x3000/artworks-rs78hv1cbjcs73mq-krkgla-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:57</itunes:duration>
      <itunes:summary>You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.</itunes:summary>
      <itunes:subtitle>You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>479</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2235351191</guid>
      <title>Root Causes 561: What Is Classic McEliece?</title>
      <description><![CDATA[<p>One of the NIST Round 3 PQC finalists that was never selected or eliminated is Classic McEliece. In this episode we explain in non-math terms how this algorithm works.</p>
]]></description>
      <pubDate>Tue, 23 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One of the NIST Round 3 PQC finalists that was never selected or eliminated is Classic McEliece. In this episode we explain in non-math terms how this algorithm works.</p>
]]></content:encoded>
      <enclosure length="7585580" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/94964741-3914-4e55-b69e-40a24f468156/audio/c12484fd-6abb-421e-9147-d2e30b3a54d9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 561: What Is Classic McEliece?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/94964741-3914-4e55-b69e-40a24f468156/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:54</itunes:duration>
      <itunes:summary>One of the NIST Round 3 PQC finalists that was never selected or eliminated is Classic McEliece. In this episode we explain in non-math terms how this algorithm works.</itunes:summary>
      <itunes:subtitle>One of the NIST Round 3 PQC finalists that was never selected or eliminated is Classic McEliece. In this episode we explain in non-math terms how this algorithm works.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>478</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2232817193</guid>
      <title>Root Causes 560: AI in 1000 Days - Small Language Models</title>
      <description><![CDATA[<p>Continuing our examination of AI in 1000 days, we discuss the use of finely tuned small language models for highly specific use cases.</p>
]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Continuing our examination of AI in 1000 days, we discuss the use of finely tuned small language models for highly specific use cases.</p>
]]></content:encoded>
      <enclosure length="10463660" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3a5b985c-66d1-4489-b950-592fda1abc79/audio/b5dd06ec-92d9-4993-b244-95d3748d3d52/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 560: AI in 1000 Days - Small Language Models</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3a5b985c-66d1-4489-b950-592fda1abc79/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:53</itunes:duration>
      <itunes:summary>Continuing our examination of AI in 1000 days, we discuss the use of finely tuned small language models for highly specific use cases.</itunes:summary>
      <itunes:subtitle>Continuing our examination of AI in 1000 days, we discuss the use of finely tuned small language models for highly specific use cases.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>477</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2231545859</guid>
      <title>Root Causes 559: AI in 1000 days - Content Quality</title>
      <description><![CDATA[<p>We discuss what happens when the quality gap between AI-generated and human-generated content drops to zero.  We explore the consequences of this inevitable outcome.</p>
]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss what happens when the quality gap between AI-generated and human-generated content drops to zero.  We explore the consequences of this inevitable outcome.</p>
]]></content:encoded>
      <enclosure length="12023084" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f9e2f07f-79fa-4989-bfcf-ae794c3d377a/audio/7eb3a6cf-1aaf-45c2-aeab-8f6668ecd813/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 559: AI in 1000 days - Content Quality</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f9e2f07f-79fa-4989-bfcf-ae794c3d377a/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:31</itunes:duration>
      <itunes:summary>We discuss what happens when the quality gap between AI-generated and human-generated content drops to zero.  We explore the consequences of this inevitable outcome.</itunes:summary>
      <itunes:subtitle>We discuss what happens when the quality gap between AI-generated and human-generated content drops to zero.  We explore the consequences of this inevitable outcome.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>476</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2230142717</guid>
      <title>Root Causes 558: AI in 1000 days - Human-in-the-loop Economy</title>
      <description><![CDATA[<p>In our ongoing series on what AI will look like in 1000 days, we discuss the spread of a new business process, where AIs do the bulk of the work while humans sit in the loop for certain specific tasks and roles.</p>
]]></description>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing series on what AI will look like in 1000 days, we discuss the spread of a new business process, where AIs do the bulk of the work while humans sit in the loop for certain specific tasks and roles.</p>
]]></content:encoded>
      <enclosure length="7364396" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a17f4f04-fa68-4e34-899a-6410a768102c/audio/9a9d5d93-a959-4755-9edd-45b22d1a717e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 558: AI in 1000 days - Human-in-the-loop Economy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a17f4f04-fa68-4e34-899a-6410a768102c/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:40</itunes:duration>
      <itunes:summary>In our ongoing series on what AI will look like in 1000 days, we discuss the spread of a new business process, where AIs do the bulk of the work while humans sit in the loop for certain specific tasks and roles.</itunes:summary>
      <itunes:subtitle>In our ongoing series on what AI will look like in 1000 days, we discuss the spread of a new business process, where AIs do the bulk of the work while humans sit in the loop for certain specific tasks and roles.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>475</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2228664827</guid>
      <title>Root Causes 557: Top 5 PQC Laggards</title>
      <description><![CDATA[<p>Following up on our list of top 5 PQC vanguards, in this episode we detail the top 5 PQC laggards.</p>
]]></description>
      <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Following up on our list of top 5 PQC vanguards, in this episode we detail the top 5 PQC laggards.</p>
]]></content:encoded>
      <enclosure length="9394220" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5b433e08-0c98-472d-b1fd-0661af406494/audio/32b06b56-fd2f-4ffb-ae22-af865aa13771/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 557: Top 5 PQC Laggards</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5b433e08-0c98-472d-b1fd-0661af406494/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:47</itunes:duration>
      <itunes:summary>Following up on our list of top 5 PQC vanguards, in this episode we detail the top 5 PQC laggards.</itunes:summary>
      <itunes:subtitle>Following up on our list of top 5 PQC vanguards, in this episode we detail the top 5 PQC laggards.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>474</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2227371797</guid>
      <title>Root Causes 556: Top 5 PQC Vanguards</title>
      <description><![CDATA[<p>We describe the top five technology categories that are on the vanguard of driving PQC adoption.  We describe what these categories have in common and how that results in early adoption of post quantum cryptography.</p>
]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We describe the top five technology categories that are on the vanguard of driving PQC adoption.  We describe what these categories have in common and how that results in early adoption of post quantum cryptography.</p>
]]></content:encoded>
      <enclosure length="9576620" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ea0a162e-1041-4df7-8130-cca492090ad2/audio/b31495e7-49b0-4b2d-bb37-dc6473d3f87a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 556: Top 5 PQC Vanguards</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ea0a162e-1041-4df7-8130-cca492090ad2/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:58</itunes:duration>
      <itunes:summary>We describe the top five technology categories that are on the vanguard of driving PQC adoption.  We describe what these categories have in common and how that results in early adoption of post quantum cryptography.</itunes:summary>
      <itunes:subtitle>We describe the top five technology categories that are on the vanguard of driving PQC adoption.  We describe what these categories have in common and how that results in early adoption of post quantum cryptography.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>473</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2226274679</guid>
      <title>Root Causes 555: Perpretrators of Rogue Certificates</title>
      <description><![CDATA[<p>We detail the top ten groups inside the organization who introduce rogue certificates into IT organizations.</p>
]]></description>
      <pubDate>Mon, 8 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We detail the top ten groups inside the organization who introduce rogue certificates into IT organizations.</p>
]]></content:encoded>
      <enclosure length="12201260" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/050d46eb-98bc-4403-b52b-5814444797bb/audio/ff9d21be-5ec1-49d9-b7d6-0bdddc60eb9b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 555: Perpretrators of Rogue Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/050d46eb-98bc-4403-b52b-5814444797bb/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:42</itunes:duration>
      <itunes:summary>We detail the top ten groups inside the organization who introduce rogue certificates into IT organizations.</itunes:summary>
      <itunes:subtitle>We detail the top ten groups inside the organization who introduce rogue certificates into IT organizations.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>472</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2224617932</guid>
      <title>Root Causes 554: Disentangling Quantum</title>
      <description><![CDATA[<p>Tech watchers tend to conflate the many quantum technologies under development right now.   In this episode we go through these technologies and explain how they connect.</p>
]]></description>
      <pubDate>Fri, 5 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Tech watchers tend to conflate the many quantum technologies under development right now.   In this episode we go through these technologies and explain how they connect.</p>
]]></content:encoded>
      <enclosure length="9825068" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/80805e63-d09f-4df6-913a-5c389c44654e/audio/12295ba8-465c-4bba-8c5c-781d137c99a1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 554: Disentangling Quantum</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/80805e63-d09f-4df6-913a-5c389c44654e/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:14</itunes:duration>
      <itunes:summary>Tech watchers tend to conflate the many quantum technologies under development right now.   In this episode we go through these technologies and explain how they connect.</itunes:summary>
      <itunes:subtitle>Tech watchers tend to conflate the many quantum technologies under development right now.   In this episode we go through these technologies and explain how they connect.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>471</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2223613016</guid>
      <title>Root Causes 553: Connecting Quantum Clocks to Cryptography</title>
      <description><![CDATA[<p>We discuss quantum clocks and their potential role in cryptography.</p>
]]></description>
      <pubDate>Wed, 3 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss quantum clocks and their potential role in cryptography.</p>
]]></content:encoded>
      <enclosure length="5699553" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1847ef7-5919-4ec8-9b3c-f8a909f3f7c7/audio/eb9ea18e-fdeb-42bd-990f-823a0b50ab51/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 553: Connecting Quantum Clocks to Cryptography</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1847ef7-5919-4ec8-9b3c-f8a909f3f7c7/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:05:55</itunes:duration>
      <itunes:summary>We discuss quantum clocks and their potential role in cryptography.</itunes:summary>
      <itunes:subtitle>We discuss quantum clocks and their potential role in cryptography.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>470</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2222251814</guid>
      <title>Root Causes 552: 2026 Predictions</title>
      <description><![CDATA[<p>We share our PKI predictions for 2026. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA distrust, AI model poisoning, and new attack vectors.</p>
]]></description>
      <pubDate>Mon, 1 Dec 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We share our PKI predictions for 2026. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA distrust, AI model poisoning, and new attack vectors.</p>
]]></content:encoded>
      <enclosure length="31409708" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bc8e7636-bb24-4805-95ae-da8c8bfc0705/audio/bdcfbbfe-1024-457d-8f19-a230b9c7ea08/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 552: 2026 Predictions</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bc8e7636-bb24-4805-95ae-da8c8bfc0705/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:32:43</itunes:duration>
      <itunes:summary>We share our PKI predictions for 2026. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA distrust, AI model poisoning, and new attack vectors.</itunes:summary>
      <itunes:subtitle>We share our PKI predictions for 2026. Topics include PQC, eIDAS 2, CT logging, ACME, passkeys, CA distrust, AI model poisoning, and new attack vectors.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>469</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2218351724</guid>
      <title>Root Causes 551: PKI in a Swarm at 50 mph</title>
      <description><![CDATA[<p>Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.</p>
]]></description>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.</p>
]]></content:encoded>
      <enclosure length="9497132" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/68c2a1bd-a8ab-44e3-880c-bcdb8b11e735/audio/e1c3da17-9007-42ea-86f8-9ed948399535/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 551: PKI in a Swarm at 50 mph</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/68c2a1bd-a8ab-44e3-880c-bcdb8b11e735/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:53</itunes:duration>
      <itunes:summary>Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.</itunes:summary>
      <itunes:subtitle>Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>468</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2216773616</guid>
      <title>Root Causes 550: WebPKI Certificate Lifespan - How Low Can You Go?</title>
      <description><![CDATA[<p>Certificate maximum term is shrinking.  In this episode we examine exactly how short they could get.</p>
]]></description>
      <pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certificate maximum term is shrinking.  In this episode we examine exactly how short they could get.</p>
]]></content:encoded>
      <enclosure length="15145062" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b92c28a3-be78-4193-a60d-27fb443742a1/audio/6dc588eb-9013-4e1d-b3c4-a73c93b03237/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 550: WebPKI Certificate Lifespan - How Low Can You Go?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b92c28a3-be78-4193-a60d-27fb443742a1/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:15:46</itunes:duration>
      <itunes:summary>Certificate maximum term is shrinking.  In this episode we examine exactly how short they could get.</itunes:summary>
      <itunes:subtitle>Certificate maximum term is shrinking.  In this episode we examine exactly how short they could get.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>467</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2215654094</guid>
      <title>Root Causes 549: AI 1000 Days from Now - the Defeat of Voice Authentication</title>
      <description><![CDATA[<p>In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.</p>
]]></description>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.</p>
]]></content:encoded>
      <enclosure length="17440940" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c701a5e0-5e24-49ba-b59c-1faa4cbb9933/audio/d931d901-7e1c-4660-a7e7-d2831998d0e9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 549: AI 1000 Days from Now - the Defeat of Voice Authentication</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c701a5e0-5e24-49ba-b59c-1faa4cbb9933/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:18:10</itunes:duration>
      <itunes:summary>In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.</itunes:summary>
      <itunes:subtitle>In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>466</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2214189182</guid>
      <title>Root Causes 548: AI 1000 Days from Now - Emotional Intelligence</title>
      <description><![CDATA[<p>We begin a new series about what we expect from AI in the next three years.  In this episode we discuss AI emulating emotional intelligence and its benefits.</p>
]]></description>
      <pubDate>Mon, 17 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We begin a new series about what we expect from AI in the next three years.  In this episode we discuss AI emulating emotional intelligence and its benefits.</p>
]]></content:encoded>
      <enclosure length="17020134" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/32ddd296-fc33-400f-b6c1-d29dae046523/audio/20a2f816-3fd9-4011-be3d-9d215a7c8c3e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 548: AI 1000 Days from Now - Emotional Intelligence</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/32ddd296-fc33-400f-b6c1-d29dae046523/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:43</itunes:duration>
      <itunes:summary>We begin a new series about what we expect from AI in the next three years.  In this episode we discuss AI emulating emotional intelligence and its benefits.</itunes:summary>
      <itunes:subtitle>We begin a new series about what we expect from AI in the next three years.  In this episode we discuss AI emulating emotional intelligence and its benefits.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>465</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2212651718</guid>
      <title>Root Causes 547: Should We Do Mass Revocation Fire Drills?</title>
      <description><![CDATA[<p>In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.</p>
]]></description>
      <pubDate>Fri, 14 Nov 2025 18:19:07 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.</p>
]]></content:encoded>
      <enclosure length="12045414" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ab799b29-e9f7-4944-b9c2-083b091ec70e/audio/a7143e4d-7956-4d17-aecf-62b05bab7eb6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 547: Should We Do Mass Revocation Fire Drills?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ab799b29-e9f7-4944-b9c2-083b091ec70e/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:32</itunes:duration>
      <itunes:summary>In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.</itunes:summary>
      <itunes:subtitle>In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>464</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2211490553</guid>
      <title>Root Causes 546: New Research Codifies Arguments for and Against QWACs</title>
      <description><![CDATA[<p>We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at https://orbilu.uni.lu/handle/10993/66334.</p>
]]></description>
      <pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at https://orbilu.uni.lu/handle/10993/66334.</p>
]]></content:encoded>
      <enclosure length="41696300" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0bc68c71-1270-487f-b807-9f1150c0a4ac/audio/95d4ebff-d0a9-4a45-840e-b851382d6bf6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 546: New Research Codifies Arguments for and Against QWACs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0bc68c71-1270-487f-b807-9f1150c0a4ac/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:43:25</itunes:duration>
      <itunes:summary>We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at https://orbilu.uni.lu/handle/10993/66334.</itunes:summary>
      <itunes:subtitle>We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at https://orbilu.uni.lu/handle/10993/66334.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>463</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2210138207</guid>
      <title>Root Causes 545: What Is MOSH?</title>
      <description><![CDATA[<p>The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.</p>
]]></description>
      <pubDate>Mon, 10 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.</p>
]]></content:encoded>
      <enclosure length="7983788" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ddef5c32-bd7f-4651-8e7f-235532b7d790/audio/0c932541-39ee-43bd-8f1c-9eabfdca96e3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 545: What Is MOSH?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ddef5c32-bd7f-4651-8e7f-235532b7d790/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:18</itunes:duration>
      <itunes:summary>The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.</itunes:summary>
      <itunes:subtitle>The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>462</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2207500515</guid>
      <title>Root Causes 543: AI Finds a Zero Day</title>
      <description><![CDATA[<p>We have seen the first known instance of an AI tool discovering a zero-day vulnerability.  This could have vast implications on vulnerability detection and bug bounty programs.  We discuss the implications.</p>
]]></description>
      <pubDate>Wed, 5 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We have seen the first known instance of an AI tool discovering a zero-day vulnerability.  This could have vast implications on vulnerability detection and bug bounty programs.  We discuss the implications.</p>
]]></content:encoded>
      <enclosure length="17048492" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a891bb90-a468-4ea6-bbee-2b756e3df19f/audio/8837171e-67a4-4baa-a717-a09918fb9556/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 543: AI Finds a Zero Day</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a891bb90-a468-4ea6-bbee-2b756e3df19f/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:45</itunes:duration>
      <itunes:summary>We have seen the first known instance of an AI tool discovering a zero-day vulnerability.  This could have vast implications on vulnerability detection and bug bounty programs.  We discuss the implications.</itunes:summary>
      <itunes:subtitle>We have seen the first known instance of an AI tool discovering a zero-day vulnerability.  This could have vast implications on vulnerability detection and bug bounty programs.  We discuss the implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>460</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2208813338</guid>
      <title>Root Causes 544: What Is Chain of Lure?</title>
      <description><![CDATA[<p>Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs.  Jason explains this attack and its implications.</p>
]]></description>
      <pubDate>Wed, 5 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs.  Jason explains this attack and its implications.</p>
]]></content:encoded>
      <enclosure length="9647276" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4d8a13fc-c384-42c1-8513-871ffda9e0d3/audio/c8aafab9-faaf-4c13-9217-b88eaa8afcea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 544: What Is Chain of Lure?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4d8a13fc-c384-42c1-8513-871ffda9e0d3/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:02</itunes:duration>
      <itunes:summary>Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs.  Jason explains this attack and its implications.</itunes:summary>
      <itunes:subtitle>Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs.  Jason explains this attack and its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>461</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2205649003</guid>
      <title>Root Causes 542: Use Cases for HQC</title>
      <description><![CDATA[<p>In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.</p>
]]></description>
      <pubDate>Sun, 2 Nov 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.</p>
]]></content:encoded>
      <enclosure length="10150700" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a4b383f2-c5d3-4f68-b93f-b29e906422e1/audio/f7ee3e52-9590-4435-b98c-3296ac0f9da1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 542: Use Cases for HQC</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a4b383f2-c5d3-4f68-b93f-b29e906422e1/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:34</itunes:duration>
      <itunes:summary>In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.</itunes:summary>
      <itunes:subtitle>In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>459</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2204032767</guid>
      <title>Root Causes 541: Introducing the HQC PQC Algorithm</title>
      <description><![CDATA[<p>NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC.  We explain this code-based algorithm.</p>
]]></description>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC.  We explain this code-based algorithm.</p>
]]></content:encoded>
      <enclosure length="6592556" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/823cfc02-4ebb-415d-afa2-ad8dd14f54b6/audio/ff29c549-098a-462b-a4c3-412b36d3e50d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 541: Introducing the HQC PQC Algorithm</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/823cfc02-4ebb-415d-afa2-ad8dd14f54b6/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:06:52</itunes:duration>
      <itunes:summary>NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC.  We explain this code-based algorithm.</itunes:summary>
      <itunes:subtitle>NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC.  We explain this code-based algorithm.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>458</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2200012703</guid>
      <title>Root Causes 540: Contextual CBOM</title>
      <description><![CDATA[<p>We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.</p>
]]></description>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.</p>
]]></content:encoded>
      <enclosure length="10613036" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/39d36e76-32ce-4e17-b86d-5343409398a9/audio/e3593310-1213-4857-887a-45b1873e3579/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 540: Contextual CBOM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/39d36e76-32ce-4e17-b86d-5343409398a9/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:03</itunes:duration>
      <itunes:summary>We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.</itunes:summary>
      <itunes:subtitle>We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>457</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2196556887</guid>
      <title>Root Causes 539: What Is the Two-QWAC Architecture?</title>
      <description><![CDATA[<p>A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The &quot;two-QWAC architecture&quot; introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain.  We explain what's coming and why.</p>
]]></description>
      <pubDate>Wed, 22 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The &quot;two-QWAC architecture&quot; introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain.  We explain what's coming and why.</p>
]]></content:encoded>
      <enclosure length="19244588" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d375922d-e61c-47b6-b866-cc037d788c20/audio/4c9377f1-88ca-452f-b410-7d5d2fc2163b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 539: What Is the Two-QWAC Architecture?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d375922d-e61c-47b6-b866-cc037d788c20/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:20:02</itunes:duration>
      <itunes:summary>A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The &quot;two-QWAC architecture&quot; introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain.  We explain what&apos;s coming and why.</itunes:summary>
      <itunes:subtitle>A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The &quot;two-QWAC architecture&quot; introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain.  We explain what&apos;s coming and why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>456</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2194581507</guid>
      <title>Root Causes 538: What Is an Entropy Desert?</title>
      <description><![CDATA[<p>An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.</p>
]]></description>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.</p>
]]></content:encoded>
      <enclosure length="8680938" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6e1bf2e6-8205-42c5-8e86-991a4d2c1a3f/audio/05a80d9a-4a28-45d3-8e14-42edb8948d52/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 538: What Is an Entropy Desert?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6e1bf2e6-8205-42c5-8e86-991a4d2c1a3f/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:02</itunes:duration>
      <itunes:summary>An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.</itunes:summary>
      <itunes:subtitle>An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>455</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2192281667</guid>
      <title>Root Causes 537: The Thermodynamics of Privacy</title>
      <description><![CDATA[<p>In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.</p>
]]></description>
      <pubDate>Fri, 17 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.</p>
]]></content:encoded>
      <enclosure length="13041258" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/69241bde-9a5f-4f16-97d0-90fd02524c1b/audio/61afb412-0d65-455b-a4ff-bd94b2aa5f49/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 537: The Thermodynamics of Privacy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/69241bde-9a5f-4f16-97d0-90fd02524c1b/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:34</itunes:duration>
      <itunes:summary>In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur&apos;s principle.</itunes:summary>
      <itunes:subtitle>In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur&apos;s principle.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>454</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2190819231</guid>
      <title>Root Causes 536: Patent Blocker on ML-KEM</title>
      <description><![CDATA[<p>A patent dispute in 2024 nearly blocked ML-KEM.  But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations.  We explain.</p>
]]></description>
      <pubDate>Wed, 15 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A patent dispute in 2024 nearly blocked ML-KEM.  But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations.  We explain.</p>
]]></content:encoded>
      <enclosure length="11391020" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dfd06f55-af58-4e5d-9613-8016a2813625/audio/56816172-a4b5-4dfb-abc8-4c889a9ff65e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 536: Patent Blocker on ML-KEM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dfd06f55-af58-4e5d-9613-8016a2813625/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:51</itunes:duration>
      <itunes:summary>A patent dispute in 2024 nearly blocked ML-KEM.  But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations.  We explain.</itunes:summary>
      <itunes:subtitle>A patent dispute in 2024 nearly blocked ML-KEM.  But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>453</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2189558243</guid>
      <title>Root Causes 535: The CPS Is a Superset of Actual Practices</title>
      <description><![CDATA[<p>The CPS must always be a superset of actual practices in a properly running CA.  We explain why this is a product of good design.</p>
]]></description>
      <pubDate>Sun, 12 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CPS must always be a superset of actual practices in a properly running CA.  We explain why this is a product of good design.</p>
]]></content:encoded>
      <enclosure length="9973861" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/479e9144-e9b8-47a4-870f-a98439c976a9/audio/e7c1ebc2-55bd-4574-bbbf-46fab288aab3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 535: The CPS Is a Superset of Actual Practices</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/479e9144-e9b8-47a4-870f-a98439c976a9/3000x3000/artworks-rs78hv1cbjcs73mq-krkgla-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:22</itunes:duration>
      <itunes:summary>The CPS must always be a superset of actual practices in a properly running CA.  We explain why this is a product of good design.</itunes:summary>
      <itunes:subtitle>The CPS must always be a superset of actual practices in a properly running CA.  We explain why this is a product of good design.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>452</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2187354483</guid>
      <title>Root Causes 534: Signing the Machines That Think</title>
      <description><![CDATA[<p>Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime.  How do you know?  Jason proposes that, the same way we sign our code, we should be signing our AI models as well.</p>
]]></description>
      <pubDate>Fri, 10 Oct 2025 17:47:53 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime.  How do you know?  Jason proposes that, the same way we sign our code, we should be signing our AI models as well.</p>
]]></content:encoded>
      <enclosure length="8593386" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/472498a5-413b-48f0-b769-478f2b4b63e4/audio/9df87392-cbd5-4904-9171-5f0cafad00ac/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 534: Signing the Machines That Think</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/472498a5-413b-48f0-b769-478f2b4b63e4/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:56</itunes:duration>
      <itunes:summary>Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime.  How do you know?  Jason proposes that, the same way we sign our code, we should be signing our AI models as well.</itunes:summary>
      <itunes:subtitle>Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime.  How do you know?  Jason proposes that, the same way we sign our code, we should be signing our AI models as well.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>451</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2184313987</guid>
      <title>Root Causes 533: Flexibility Through Multi-CA Trust Models</title>
      <description><![CDATA[<p>We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&amp;A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.</p>
]]></description>
      <pubDate>Tue, 7 Oct 2025 14:37:29 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&amp;A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.</p>
]]></content:encoded>
      <enclosure length="9054822" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/266049bc-626d-4290-87bb-5a138d09126b/audio/e41bc141-21b7-4f16-a6e0-9b6b91e6dca7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 533: Flexibility Through Multi-CA Trust Models</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/266049bc-626d-4290-87bb-5a138d09126b/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:25</itunes:duration>
      <itunes:summary>We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&amp;A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.</itunes:summary>
      <itunes:subtitle>We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&amp;A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>450</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2181721771</guid>
      <title>Root Causes 532: Introducing Offline PKI</title>
      <description><![CDATA[<p>In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.</p>
]]></description>
      <pubDate>Thu, 2 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.</p>
]]></content:encoded>
      <enclosure length="10639206" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3ff14a0a-1779-4890-a100-8a0e764320a0/audio/3ee6b1ed-d4aa-445a-b951-9dcbeb579dbd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 532: Introducing Offline PKI</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3ff14a0a-1779-4890-a100-8a0e764320a0/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:04</itunes:duration>
      <itunes:summary>In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.</itunes:summary>
      <itunes:subtitle>In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>449</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2180429579</guid>
      <title>Root Causes 531: Benefits of Single-purpose Root Hierarchies</title>
      <description><![CDATA[<p>Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones.  We discuss why.</p>
]]></description>
      <pubDate>Wed, 1 Oct 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones.  We discuss why.</p>
]]></content:encoded>
      <enclosure length="15945851" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ea117f24-d5de-4394-9673-7bac0479ce5a/audio/044e99a2-43dd-40b4-b026-93de075199f5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 531: Benefits of Single-purpose Root Hierarchies</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ea117f24-d5de-4394-9673-7bac0479ce5a/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:16:36</itunes:duration>
      <itunes:summary>Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones.  We discuss why.</itunes:summary>
      <itunes:subtitle>Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones.  We discuss why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>448</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2178716436</guid>
      <title>Root Causes 530: Introducing the AI Iceberg</title>
      <description><![CDATA[<p>We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.</p>
]]></description>
      <pubDate>Mon, 29 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.</p>
]]></content:encoded>
      <enclosure length="18025687" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f04f6c91-ade3-400f-8dfa-0cdf3d58782c/audio/6758f4cb-2837-46bb-9a44-438ddbe3c966/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 530: Introducing the AI Iceberg</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f04f6c91-ade3-400f-8dfa-0cdf3d58782c/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:18:46</itunes:duration>
      <itunes:summary>We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.</itunes:summary>
      <itunes:subtitle>We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>447</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2175984219</guid>
      <title>Root Causes 529: What Is a Common Mark Certificate?</title>
      <description><![CDATA[<p>Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.</p>
]]></description>
      <pubDate>Wed, 24 Sep 2025 18:30:27 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.</p>
]]></content:encoded>
      <enclosure length="7245563" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1a193883-9dc6-4614-84a8-1ceddfb298a6/audio/e2481d40-0d76-44ce-9c99-99a94001f5e6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 529: What Is a Common Mark Certificate?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1a193883-9dc6-4614-84a8-1ceddfb298a6/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:32</itunes:duration>
      <itunes:summary>Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.</itunes:summary>
      <itunes:subtitle>Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>446</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2172772287</guid>
      <title>Root Causes 528: Misissued SSL Certificate for 1.1.1.1</title>
      <description><![CDATA[<p>A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses.  We go into the details.</p>
]]></description>
      <pubDate>Wed, 17 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses.  We go into the details.</p>
]]></content:encoded>
      <enclosure length="16820396" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/929cbad5-c446-481b-95ba-134501653b60/audio/d5867f0d-de82-4685-b456-199a12fe7d3c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 528: Misissued SSL Certificate for 1.1.1.1</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/929cbad5-c446-481b-95ba-134501653b60/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:31</itunes:duration>
      <itunes:summary>A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses.  We go into the details.</itunes:summary>
      <itunes:subtitle>A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses.  We go into the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>445</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2170977132</guid>
      <title>Root Causes 527: Key Dates for the Deprecation of Public mTLS</title>
      <description><![CDATA[<p>Client authentication using public TLS server certificates is on the deprecation path.  In this episode we go through the key dates in this deprecation.</p>
]]></description>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Client authentication using public TLS server certificates is on the deprecation path.  In this episode we go through the key dates in this deprecation.</p>
]]></content:encoded>
      <enclosure length="10021499" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a2a4d4b7-f42e-4e95-8e19-38686bedf745/audio/02fd63fb-6341-4b0a-9984-7531d5579b40/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 527: Key Dates for the Deprecation of Public mTLS</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a2a4d4b7-f42e-4e95-8e19-38686bedf745/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:25</itunes:duration>
      <itunes:summary>Client authentication using public TLS server certificates is on the deprecation path.  In this episode we go through the key dates in this deprecation.</itunes:summary>
      <itunes:subtitle>Client authentication using public TLS server certificates is on the deprecation path.  In this episode we go through the key dates in this deprecation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>444</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2169577398</guid>
      <title>Root Causes 526: Voice Biometrics Are Worthless</title>
      <description><![CDATA[<p>Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.</p>
]]></description>
      <pubDate>Fri, 12 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.</p>
]]></content:encoded>
      <enclosure length="8200187" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/588290bc-bca9-4749-8693-8badfb679387/audio/584773cd-b904-4e33-923c-bd62e10db176/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 526: Voice Biometrics Are Worthless</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/588290bc-bca9-4749-8693-8badfb679387/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:32</itunes:duration>
      <itunes:summary>Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.</itunes:summary>
      <itunes:subtitle>Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>443</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2168322969</guid>
      <title>Root Causes 525: The End of Email-based DCV</title>
      <description><![CDATA[<p>A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years.  We go into the details.</p>
]]></description>
      <pubDate>Wed, 10 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years.  We go into the details.</p>
]]></content:encoded>
      <enclosure length="9667084" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b0ce0860-80bb-4a1d-921a-a9a2b0e308da/audio/757139af-55e1-4a16-8788-41bc4d9233d6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 525: The End of Email-based DCV</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b0ce0860-80bb-4a1d-921a-a9a2b0e308da/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:03</itunes:duration>
      <itunes:summary>A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years.  We go into the details.</itunes:summary>
      <itunes:subtitle>A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years.  We go into the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>442</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2166952509</guid>
      <title>Root Causes 524: How to Kill Three Birds with One Stone</title>
      <description><![CDATA[<p>Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates.  These are 47-day SSL, PQC, and the deprecation of mTLS.  We describe the overlap between these efforts and how to combine them for better efficiency and project management.</p>
]]></description>
      <pubDate>Mon, 8 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates.  These are 47-day SSL, PQC, and the deprecation of mTLS.  We describe the overlap between these efforts and how to combine them for better efficiency and project management.</p>
]]></content:encoded>
      <enclosure length="12203403" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5a1f779c-9d9d-42ec-b326-d90fc4be94d7/audio/bbcf05dc-cc65-4fed-a5b4-6063777a850c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 524: How to Kill Three Birds with One Stone</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5a1f779c-9d9d-42ec-b326-d90fc4be94d7/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:42</itunes:duration>
      <itunes:summary>Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates.  These are 47-day SSL, PQC, and the deprecation of mTLS.  We describe the overlap between these efforts and how to combine them for better efficiency and project management.</itunes:summary>
      <itunes:subtitle>Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates.  These are 47-day SSL, PQC, and the deprecation of mTLS.  We describe the overlap between these efforts and how to combine them for better efficiency and project management.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>441</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2164194417</guid>
      <title>Root Causes 523: Will Your Configuration Block MPIC DCV?</title>
      <description><![CDATA[<p>MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.</p>
]]></description>
      <pubDate>Wed, 3 Sep 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.</p>
]]></content:encoded>
      <enclosure length="10822952" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2e1d1596-29cc-441f-a4bb-905ff3860fed/audio/4b92e02a-22c6-4cb9-a077-82e3b14567f3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 523: Will Your Configuration Block MPIC DCV?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2e1d1596-29cc-441f-a4bb-905ff3860fed/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:16</itunes:duration>
      <itunes:summary>MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.</itunes:summary>
      <itunes:subtitle>MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>440</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2160975474</guid>
      <title>Root Causes 522: How Prepared Are Enterprises for PQC? (Part 2)</title>
      <description><![CDATA[<p>We complete our description and commentary on the results of Sectigo's survey of enterprise preparedness for Post Quantum Cryptography (PQC).</p>
]]></description>
      <pubDate>Wed, 27 Aug 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We complete our description and commentary on the results of Sectigo's survey of enterprise preparedness for Post Quantum Cryptography (PQC).</p>
]]></content:encoded>
      <enclosure length="32139925" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/59d55718-a679-45c4-8fef-086b8f861ae7/audio/57f1dbcf-291f-467e-bb25-eb30983946b3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 522: How Prepared Are Enterprises for PQC? (Part 2)</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/59d55718-a679-45c4-8fef-086b8f861ae7/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:33:28</itunes:duration>
      <itunes:summary>We complete our description and commentary on the results of Sectigo&apos;s survey of enterprise preparedness for Post Quantum Cryptography (PQC).</itunes:summary>
      <itunes:subtitle>We complete our description and commentary on the results of Sectigo&apos;s survey of enterprise preparedness for Post Quantum Cryptography (PQC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>439</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2157705177</guid>
      <title>Root Causes 521: How Prepared Are Enterprises for PQC? (Part 1)</title>
      <description><![CDATA[<p>We begin to go over the results of Sectigo's recent survey of enterprises and their preparedness and plans for adopting Post Quantum Cryptography (PQC).</p>
]]></description>
      <pubDate>Fri, 22 Aug 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We begin to go over the results of Sectigo's recent survey of enterprises and their preparedness and plans for adopting Post Quantum Cryptography (PQC).</p>
]]></content:encoded>
      <enclosure length="31079707" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9d9652a0-285b-4b12-9b51-c3c8a3accbfd/audio/c9b5b021-7321-4ff9-9a34-25ff487e407f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 521: How Prepared Are Enterprises for PQC? (Part 1)</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9d9652a0-285b-4b12-9b51-c3c8a3accbfd/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:32:22</itunes:duration>
      <itunes:summary>We begin to go over the results of Sectigo&apos;s recent survey of enterprises and their preparedness and plans for adopting Post Quantum Cryptography (PQC).</itunes:summary>
      <itunes:subtitle>We begin to go over the results of Sectigo&apos;s recent survey of enterprises and their preparedness and plans for adopting Post Quantum Cryptography (PQC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>438</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2156463075</guid>
      <title>Root Causes 520: How Prepared Are IT Teams for 47-day Certificates?</title>
      <description><![CDATA[<p>Sectigo has released the results of its survey of IT professionals in charge of certificates to measure their readiness and preparation for 47-day maximum certificate term.  We go over the results.</p>
]]></description>
      <pubDate>Wed, 20 Aug 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Sectigo has released the results of its survey of IT professionals in charge of certificates to measure their readiness and preparation for 47-day maximum certificate term.  We go over the results.</p>
]]></content:encoded>
      <enclosure length="43294327" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/585c6f24-6b4e-4a08-8ec9-c7ae090a91d4/audio/a7390159-fc6a-48ec-8123-cb967a59bf58/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 520: How Prepared Are IT Teams for 47-day Certificates?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/585c6f24-6b4e-4a08-8ec9-c7ae090a91d4/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:45:05</itunes:duration>
      <itunes:summary>Sectigo has released the results of its survey of IT professionals in charge of certificates to measure their readiness and preparation for 47-day maximum certificate term.  We go over the results.</itunes:summary>
      <itunes:subtitle>Sectigo has released the results of its survey of IT professionals in charge of certificates to measure their readiness and preparation for 47-day maximum certificate term.  We go over the results.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>437</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2155391607</guid>
      <title>Root Causes 519: AI Is the Room</title>
      <description><![CDATA[<p>AI is not the elephant in the room. It is the room itself.  Jason explains what he means by that.</p>
]]></description>
      <pubDate>Mon, 18 Aug 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>AI is not the elephant in the room. It is the room itself.  Jason explains what he means by that.</p>
]]></content:encoded>
      <enclosure length="17688232" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/82fb92ea-03b7-42ca-9dcd-5424d6d38967/audio/e37fa869-a852-48cd-a22e-719b5afc1bd2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 519: AI Is the Room</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/82fb92ea-03b7-42ca-9dcd-5424d6d38967/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:18:25</itunes:duration>
      <itunes:summary>AI is not the elephant in the room. It is the room itself.  Jason explains what he means by that.</itunes:summary>
      <itunes:subtitle>AI is not the elephant in the room. It is the room itself.  Jason explains what he means by that.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>436</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2152568520</guid>
      <title>Root Causes 518: NCSC Lukewarm on FIDO WebAuthn</title>
      <description><![CDATA[<p>Britain's National Cyber Security Centre recently issued a lukewarm verdict on passkeys as an authentication solution.  We explore the problems with WebAuthn, including account recovery, spotty availability, inconsistent implementation, and lack of Linux support.</p>
]]></description>
      <pubDate>Wed, 13 Aug 2025 16:39:38 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Britain's National Cyber Security Centre recently issued a lukewarm verdict on passkeys as an authentication solution.  We explore the problems with WebAuthn, including account recovery, spotty availability, inconsistent implementation, and lack of Linux support.</p>
]]></content:encoded>
      <enclosure length="15867027" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fa7efc4e-17a2-4bea-918e-75cece387daf/audio/f7a0691d-5e76-48cd-8c01-35f5b832b59d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 518: NCSC Lukewarm on FIDO WebAuthn</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fa7efc4e-17a2-4bea-918e-75cece387daf/3000x3000/artworks-icmz0sssqhuh9ryd-6gmnew-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:16:31</itunes:duration>
      <itunes:summary>Britain&apos;s National Cyber Security Centre recently issued a lukewarm verdict on passkeys as an authentication solution.  We explore the problems with WebAuthn, including account recovery, spotty availability, inconsistent implementation, and lack of Linux support.</itunes:summary>
      <itunes:subtitle>Britain&apos;s National Cyber Security Centre recently issued a lukewarm verdict on passkeys as an authentication solution.  We explore the problems with WebAuthn, including account recovery, spotty availability, inconsistent implementation, and lack of Linux support.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>435</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2136524310</guid>
      <title>Root Causes 517: The Cost of Quantum Factoring</title>
      <description><![CDATA[<p>Jason walks us through an important recent paper from Google tracking the cost of quantum factoring.</p>
]]></description>
      <pubDate>Fri, 25 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason walks us through an important recent paper from Google tracking the cost of quantum factoring.</p>
]]></content:encoded>
      <enclosure length="5142574" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cba83023-6e59-40a1-b5e3-4c2f99242b3b/audio/dcfe82f2-ba1f-403a-a8ce-e44eb39983ac/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 517: The Cost of Quantum Factoring</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cba83023-6e59-40a1-b5e3-4c2f99242b3b/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:05:20</itunes:duration>
      <itunes:summary>Jason walks us through an important recent paper from Google tracking the cost of quantum factoring.</itunes:summary>
      <itunes:subtitle>Jason walks us through an important recent paper from Google tracking the cost of quantum factoring.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>434</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2133865932</guid>
      <title>Root Causes 516: PQC for ADCS</title>
      <description><![CDATA[<p>Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft's checkered support for ADCS and offer some questions users should be asking.</p>
]]></description>
      <pubDate>Mon, 21 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft's checkered support for ADCS and offer some questions users should be asking.</p>
]]></content:encoded>
      <enclosure length="13114407" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0345d6c4-2a9d-4b17-80f0-763f949fcaec/audio/4fbcffd2-b3f4-4905-bed1-3edb6d06112d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 516: PQC for ADCS</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0345d6c4-2a9d-4b17-80f0-763f949fcaec/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:39</itunes:duration>
      <itunes:summary>Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft&apos;s checkered support for ADCS and offer some questions users should be asking.</itunes:summary>
      <itunes:subtitle>Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft&apos;s checkered support for ADCS and offer some questions users should be asking.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>433</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2132474928</guid>
      <title>Root Causes 515: What Is Entropy-aware Governance?</title>
      <description><![CDATA[<p>Jason coins the term &quot;entropy-aware governance&quot; to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.</p>
]]></description>
      <pubDate>Fri, 18 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason coins the term &quot;entropy-aware governance&quot; to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.</p>
]]></content:encoded>
      <enclosure length="14274471" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d451cb1b-d8d0-4687-94b3-71155d41c8e1/audio/9b67ade8-964c-48e0-a8d8-8a98099e0d5f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 515: What Is Entropy-aware Governance?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d451cb1b-d8d0-4687-94b3-71155d41c8e1/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:14:51</itunes:duration>
      <itunes:summary>Jason coins the term &quot;entropy-aware governance&quot; to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.</itunes:summary>
      <itunes:subtitle>Jason coins the term &quot;entropy-aware governance&quot; to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>432</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2131171575</guid>
      <title>Root Causes 514: Diary of an Online Firestorm</title>
      <description><![CDATA[<p>Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread.  We discuss what a more functional response would have looked like.</p>
]]></description>
      <pubDate>Wed, 16 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread.  We discuss what a more functional response would have looked like.</p>
]]></content:encoded>
      <enclosure length="12258471" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fb1f5d6c-e1d5-4b1e-9c00-78130498301a/audio/be2af9b0-451e-49ce-87ed-785e19141ba4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 514: Diary of an Online Firestorm</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fb1f5d6c-e1d5-4b1e-9c00-78130498301a/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:45</itunes:duration>
      <itunes:summary>Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread.  We discuss what a more functional response would have looked like.</itunes:summary>
      <itunes:subtitle>Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread.  We discuss what a more functional response would have looked like.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>431</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2129716587</guid>
      <title>Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?</title>
      <description><![CDATA[<p>We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.</p>
]]></description>
      <pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.</p>
]]></content:encoded>
      <enclosure length="11879463" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fffb581f-3f17-4be3-99a9-26f12b74ab78/audio/ee6834f8-4bad-4d12-8d2b-0754835a784f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fffb581f-3f17-4be3-99a9-26f12b74ab78/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:21</itunes:duration>
      <itunes:summary>We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.</itunes:summary>
      <itunes:subtitle>We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>430</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2128329717</guid>
      <title>Root Causes 512: CPS Versus Practices Misalignment</title>
      <description><![CDATA[<p>We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.</p>
]]></description>
      <pubDate>Fri, 11 Jul 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.</p>
]]></content:encoded>
      <enclosure length="12198177" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/729c8d86-1ce9-4735-b6a9-e7e637b62061/audio/b175c6bd-8a02-4428-b839-c2dbda400798/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 512: CPS Versus Practices Misalignment</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/729c8d86-1ce9-4735-b6a9-e7e637b62061/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:41</itunes:duration>
      <itunes:summary>We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.</itunes:summary>
      <itunes:subtitle>We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>429</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2125146465</guid>
      <title>Root Causes 511: The GoML Root Store</title>
      <description><![CDATA[<p>We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason's adventure in creating his own custom root store.</p>
]]></description>
      <pubDate>Sat, 5 Jul 2025 18:45:33 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason's adventure in creating his own custom root store.</p>
]]></content:encoded>
      <enclosure length="15074344" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d624f6a3-f815-425b-8f91-5f1f743d089b/audio/ffe6c258-e1f6-41dc-a2ca-2bac925c44e3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 511: The GoML Root Store</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d624f6a3-f815-425b-8f91-5f1f743d089b/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:15:41</itunes:duration>
      <itunes:summary>We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason&apos;s adventure in creating his own custom root store.</itunes:summary>
      <itunes:subtitle>We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason&apos;s adventure in creating his own custom root store.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>428</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2120637906</guid>
      <title>Root Causes 510: Introducing the GoML Browser</title>
      <description><![CDATA[<p>We discuss Jason's code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discuss SSL certificate information, EV indicators, and cookie handling.</p>
]]></description>
      <pubDate>Thu, 26 Jun 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss Jason's code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discuss SSL certificate information, EV indicators, and cookie handling.</p>
]]></content:encoded>
      <enclosure length="9894981" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/541db6f3-24a5-4549-84fc-c4d9586031ac/audio/1c0c7d9c-b5af-4c4f-86d6-14149488b775/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 510: Introducing the GoML Browser</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/541db6f3-24a5-4549-84fc-c4d9586031ac/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:18</itunes:duration>
      <itunes:summary>We discuss Jason&apos;s code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discuss SSL certificate information, EV indicators, and cookie handling.</itunes:summary>
      <itunes:subtitle>We discuss Jason&apos;s code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discuss SSL certificate information, EV indicators, and cookie handling.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>427</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2119335714</guid>
      <title>Root Causes 509: What Is a CPS?</title>
      <description><![CDATA[<p>We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.</p>
]]></description>
      <pubDate>Wed, 25 Jun 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.</p>
]]></content:encoded>
      <enclosure length="7211562" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fd7f5f5d-8462-4edf-9b1e-1a932f98a837/audio/163804a5-f251-482d-868c-d471e9a67157/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 509: What Is a CPS?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fd7f5f5d-8462-4edf-9b1e-1a932f98a837/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:30</itunes:duration>
      <itunes:summary>We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.</itunes:summary>
      <itunes:subtitle>We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>426</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2118306795</guid>
      <title>Root Causes 508: What Is Code Vibing?</title>
      <description><![CDATA[<p>&quot;Code vibing&quot; is using generative AI to create or improve working code. We share Jason's adventure using code vibing to create his own web browser.</p>
]]></description>
      <pubDate>Mon, 23 Jun 2025 18:49:44 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>&quot;Code vibing&quot; is using generative AI to create or improve working code. We share Jason's adventure using code vibing to create his own web browser.</p>
]]></content:encoded>
      <enclosure length="17018920" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5ba62439-9e7c-4b8e-8bf2-935517762267/audio/746db769-ec83-4f38-9804-b4c994877e9f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 508: What Is Code Vibing?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5ba62439-9e7c-4b8e-8bf2-935517762267/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:43</itunes:duration>
      <itunes:summary>&quot;Code vibing&quot; is using generative AI to create or improve working code. We share Jason&apos;s adventure using code vibing to create his own web browser.</itunes:summary>
      <itunes:subtitle>&quot;Code vibing&quot; is using generative AI to create or improve working code. We share Jason&apos;s adventure using code vibing to create his own web browser.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>425</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2116385109</guid>
      <title>Root Causes 507: First Distrust of 2025</title>
      <description><![CDATA[<p>The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.</p>
]]></description>
      <pubDate>Thu, 19 Jun 2025 21:36:04 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.</p>
]]></content:encoded>
      <enclosure length="9173251" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0e16b9c3-4cc3-4180-9cc1-e04c8067d590/audio/984297af-0485-4f1a-8d3e-9739eff8068a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 507: First Distrust of 2025</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0e16b9c3-4cc3-4180-9cc1-e04c8067d590/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:32</itunes:duration>
      <itunes:summary>The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.</itunes:summary>
      <itunes:subtitle>The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>424</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2114941899</guid>
      <title>Root Causes 506: Recap of CABF Face-to-face #65</title>
      <description><![CDATA[<p>For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting.  We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.</p>
]]></description>
      <pubDate>Tue, 17 Jun 2025 15:18:35 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting.  We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.</p>
]]></content:encoded>
      <enclosure length="8543292" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d4300f23-c78f-4e8f-8c77-1b23cb31ed98/audio/1d5edc23-639c-4583-8bca-99d9f008de69/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 506: Recap of CABF Face-to-face #65</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d4300f23-c78f-4e8f-8c77-1b23cb31ed98/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:53</itunes:duration>
      <itunes:summary>For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting.  We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.</itunes:summary>
      <itunes:subtitle>For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting.  We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>423</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2112786915</guid>
      <title>Root Causes 505: Trust Now, Forge Later</title>
      <description><![CDATA[<p>In this episode we explain the potential for future quantum computers to break files signed  today with RSA or ECC, called &quot;Trust now, forge later.&quot;</p>
]]></description>
      <pubDate>Fri, 13 Jun 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain the potential for future quantum computers to break files signed  today with RSA or ECC, called &quot;Trust now, forge later.&quot;</p>
]]></content:encoded>
      <enclosure length="10139180" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dc08c332-f8ed-49ad-8cea-b794052a8e64/audio/7df088bf-0006-4423-956d-f35ac1d3898c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 505: Trust Now, Forge Later</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dc08c332-f8ed-49ad-8cea-b794052a8e64/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:33</itunes:duration>
      <itunes:summary>In this episode we explain the potential for future quantum computers to break files signed  today with RSA or ECC, called &quot;Trust now, forge later.&quot;</itunes:summary>
      <itunes:subtitle>In this episode we explain the potential for future quantum computers to break files signed  today with RSA or ECC, called &quot;Trust now, forge later.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>422</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2111162898</guid>
      <title>Root Causes 504: Jason Programs a Quantum Computer</title>
      <description><![CDATA[<p>Jason describes his recent experience using Amazon Braket.</p>
]]></description>
      <pubDate>Tue, 10 Jun 2025 21:46:47 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason describes his recent experience using Amazon Braket.</p>
]]></content:encoded>
      <enclosure length="17097825" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4319fbb-2aee-4bc9-b2c5-cf059b50d268/audio/dc6bba1d-fd7f-46e6-90ec-74f45e3180f5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 504: Jason Programs a Quantum Computer</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4319fbb-2aee-4bc9-b2c5-cf059b50d268/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:48</itunes:duration>
      <itunes:summary>Jason describes his recent experience using Amazon Braket.</itunes:summary>
      <itunes:subtitle>Jason describes his recent experience using Amazon Braket.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>421</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2107796214</guid>
      <title>Root Causes 502: The PQC Game of Chicken</title>
      <description><![CDATA[<p>In this episode Jason explains the fallacy of &quot;playing chicken&quot; with the Quantum Apocalypse.  We discuss stack ranking and &quot;eyes open&quot; PQC risk decisions.</p>
]]></description>
      <pubDate>Wed, 4 Jun 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode Jason explains the fallacy of &quot;playing chicken&quot; with the Quantum Apocalypse.  We discuss stack ranking and &quot;eyes open&quot; PQC risk decisions.</p>
]]></content:encoded>
      <enclosure length="10550936" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/73c44007-6173-43a5-b479-ad733fcb727e/audio/bbd5d990-ec13-4914-bff8-38be851b401e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 502: The PQC Game of Chicken</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/73c44007-6173-43a5-b479-ad733fcb727e/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:59</itunes:duration>
      <itunes:summary>In this episode Jason explains the fallacy of &quot;playing chicken&quot; with the Quantum Apocalypse.  We discuss stack ranking and &quot;eyes open&quot; PQC risk decisions.</itunes:summary>
      <itunes:subtitle>In this episode Jason explains the fallacy of &quot;playing chicken&quot; with the Quantum Apocalypse.  We discuss stack ranking and &quot;eyes open&quot; PQC risk decisions.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>420</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2106502629</guid>
      <title>Root Causes 501: Why Increasing RSA Key Size Won&apos;t Solve the Quantum Problem</title>
      <description><![CDATA[<p>In this brief episode we explain why the problem that Shor's Algorithm poses to RSA and ECC can't be solved simply by increasing key size.</p>
]]></description>
      <pubDate>Mon, 2 Jun 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this brief episode we explain why the problem that Shor's Algorithm poses to RSA and ECC can't be solved simply by increasing key size.</p>
]]></content:encoded>
      <enclosure length="3451072" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4513fadf-e28f-4378-93ca-613b480356c2/audio/b351c7b9-cb4f-4276-8f63-be8c9e28368d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 501: Why Increasing RSA Key Size Won&apos;t Solve the Quantum Problem</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4513fadf-e28f-4378-93ca-613b480356c2/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:03:35</itunes:duration>
      <itunes:summary>In this brief episode we explain why the problem that Shor&apos;s Algorithm poses to RSA and ECC can&apos;t be solved simply by increasing key size.</itunes:summary>
      <itunes:subtitle>In this brief episode we explain why the problem that Shor&apos;s Algorithm poses to RSA and ECC can&apos;t be solved simply by increasing key size.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>419</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2104868721</guid>
      <title>Root Causes 500: OMG! 500 Episodes of Root Causes!</title>
      <description><![CDATA[<p>Wow. It's episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it remains consistent, and the updates we're making to keep being a valuable resource for our listeners.</p>
]]></description>
      <pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Wow. It's episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it remains consistent, and the updates we're making to keep being a valuable resource for our listeners.</p>
]]></content:encoded>
      <enclosure length="19959196" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1ae38da0-6ab1-445a-a5d4-a0f45944677d/audio/803c62d6-8599-4911-aa03-e012e04567e2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 500: OMG! 500 Episodes of Root Causes!</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1ae38da0-6ab1-445a-a5d4-a0f45944677d/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:20:46</itunes:duration>
      <itunes:summary>Wow. It&apos;s episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it remains consistent, and the updates we&apos;re making to keep being a valuable resource for our listeners.</itunes:summary>
      <itunes:subtitle>Wow. It&apos;s episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it remains consistent, and the updates we&apos;re making to keep being a valuable resource for our listeners.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>418</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2103122133</guid>
      <title>Root Causes 499: Don&apos;t Blame Signal</title>
      <description><![CDATA[<p>The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.</p>
]]></description>
      <pubDate>Tue, 27 May 2025 14:21:21 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.</p>
]]></content:encoded>
      <enclosure length="8288676" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8cbf2f02-7638-4c42-bbd6-af19c80b1802/audio/eb1dc120-6245-47e8-befc-fd78f45e7395/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 499: Don&apos;t Blame Signal</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8cbf2f02-7638-4c42-bbd6-af19c80b1802/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:37</itunes:duration>
      <itunes:summary>The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.</itunes:summary>
      <itunes:subtitle>The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>417</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2101077546</guid>
      <title>Root Causes 498: UK NCSC PQC Guidance</title>
      <description><![CDATA[<p>The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.</p>
]]></description>
      <pubDate>Fri, 23 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.</p>
]]></content:encoded>
      <enclosure length="14906540" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6f1c74bc-cb02-45f0-9252-fb7c0e3359cc/audio/c1737720-fc72-4bbb-aee8-5d334634e4f7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 498: UK NCSC PQC Guidance</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6f1c74bc-cb02-45f0-9252-fb7c0e3359cc/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:15:31</itunes:duration>
      <itunes:summary>The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.</itunes:summary>
      <itunes:subtitle>The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>416</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2099864202</guid>
      <title>Root Causes 497: PQC Update with Sofia Celi</title>
      <description><![CDATA[<p>Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp.  We learn about KEM TLS and the status of PQC initiatives in IETF.</p>
]]></description>
      <pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp.  We learn about KEM TLS and the status of PQC initiatives in IETF.</p>
]]></content:encoded>
      <enclosure length="19052580" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2914aab8-c5a3-4073-a6df-fcd5ed3e8944/audio/2b5a3faf-2a53-4a48-a976-fd5e08e45678/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 497: PQC Update with Sofia Celi</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2914aab8-c5a3-4073-a6df-fcd5ed3e8944/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:19:50</itunes:duration>
      <itunes:summary>Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp.  We learn about KEM TLS and the status of PQC initiatives in IETF.</itunes:summary>
      <itunes:subtitle>Guest Sofia Celi (IETF, Brave) returns to talk about important developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp.  We learn about KEM TLS and the status of PQC initiatives in IETF.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>415</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2098574670</guid>
      <title>Root Causes 496: E2EE Gmail</title>
      <description><![CDATA[<p>Gmail is now end-to-end encrypted for all recipients, regardless of the receiving client. We explain how Gmail accomplishes this trick.</p>
]]></description>
      <pubDate>Sun, 18 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Gmail is now end-to-end encrypted for all recipients, regardless of the receiving client. We explain how Gmail accomplishes this trick.</p>
]]></content:encoded>
      <enclosure length="11948572" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/72507302-0d28-4a85-bff2-a5f0244e0dc1/audio/099580f9-07f0-4104-819d-c8a2ecac3496/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 496: E2EE Gmail</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/72507302-0d28-4a85-bff2-a5f0244e0dc1/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:26</itunes:duration>
      <itunes:summary>Gmail is now end-to-end encrypted for all recipients, regardless of the receiving client. We explain how Gmail accomplishes this trick.</itunes:summary>
      <itunes:subtitle>Gmail is now end-to-end encrypted for all recipients, regardless of the receiving client. We explain how Gmail accomplishes this trick.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>414</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2097060360</guid>
      <title>Root Causes 495: Trust Models and Post Quantum Cryptography</title>
      <description><![CDATA[<p>We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).</p>
]]></description>
      <pubDate>Fri, 16 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).</p>
]]></content:encoded>
      <enclosure length="6734250" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/96f8b3f4-d9f4-4646-9f19-28018489385d/audio/87a454c8-94ed-4e6d-a6b3-c567ac71680b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 495: Trust Models and Post Quantum Cryptography</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/96f8b3f4-d9f4-4646-9f19-28018489385d/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).</itunes:summary>
      <itunes:subtitle>We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>413</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2095150842</guid>
      <title>Root Causes 494: Introduction to Trust Models</title>
      <description><![CDATA[<p>We explain the basics of trust models and compare various models including WebPKI, private CA, and consortium models.</p>
]]></description>
      <pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We explain the basics of trust models and compare various models including WebPKI, private CA, and consortium models.</p>
]]></content:encoded>
      <enclosure length="20322635" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ae66ad6f-806c-4e25-b57e-910063f80c2b/audio/4f1f3ffd-b7bf-4002-99a3-df5746d756a8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 494: Introduction to Trust Models</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ae66ad6f-806c-4e25-b57e-910063f80c2b/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:21:09</itunes:duration>
      <itunes:summary>We explain the basics of trust models and compare various models including WebPKI, private CA, and consortium models.</itunes:summary>
      <itunes:subtitle>We explain the basics of trust models and compare various models including WebPKI, private CA, and consortium models.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>412</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2092120323</guid>
      <title>Root Causes 493: Disentangling Public and Private Certificate Use Cases</title>
      <description><![CDATA[<p>Changing root store requirements mean CAs must separate their root hierarchies for different certificate types. We explain why enterprises should consider private CA for some use cases.</p>
]]></description>
      <pubDate>Wed, 7 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Changing root store requirements mean CAs must separate their root hierarchies for different certificate types. We explain why enterprises should consider private CA for some use cases.</p>
]]></content:encoded>
      <enclosure length="11700564" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2e3fcddc-8cfe-4449-ad3f-3d6a68479888/audio/032698a6-ba43-4763-8598-766fe76a6111/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 493: Disentangling Public and Private Certificate Use Cases</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2e3fcddc-8cfe-4449-ad3f-3d6a68479888/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:10</itunes:duration>
      <itunes:summary>Changing root store requirements mean CAs must separate their root hierarchies for different certificate types. We explain why enterprises should consider private CA for some use cases.</itunes:summary>
      <itunes:subtitle>Changing root store requirements mean CAs must separate their root hierarchies for different certificate types. We explain why enterprises should consider private CA for some use cases.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>411</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2090859687</guid>
      <title>Root Causes 492: When Mandatory Security Training Sucks</title>
      <description><![CDATA[<p>In this episode we get excited about errors we see in mandatory security trainings.</p>
]]></description>
      <pubDate>Tue, 6 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we get excited about errors we see in mandatory security trainings.</p>
]]></content:encoded>
      <enclosure length="18830248" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0e9c6b69-5699-4acc-9617-a358c4f433be/audio/3ba795ac-8c2c-4534-a2bc-11febd1e4b2b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 492: When Mandatory Security Training Sucks</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0e9c6b69-5699-4acc-9617-a358c4f433be/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:19:36</itunes:duration>
      <itunes:summary>In this episode we get excited about errors we see in mandatory security trainings.</itunes:summary>
      <itunes:subtitle>In this episode we get excited about errors we see in mandatory security trainings.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>410</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2088408507</guid>
      <title>Root Causes 491: RSA&apos;s Non-quantum Threat</title>
      <description><![CDATA[<p>We are rejoined by Dr. Michele Mosca to explore the potential threat of RSA being broken even in the absence of a quantum computing attack.</p>
]]></description>
      <pubDate>Thu, 1 May 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We are rejoined by Dr. Michele Mosca to explore the potential threat of RSA being broken even in the absence of a quantum computing attack.</p>
]]></content:encoded>
      <enclosure length="30439341" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5cf5dc38-a801-4831-9856-ba448512b45e/audio/80cc9874-eb99-46d1-ae08-e988f5bcc3b8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 491: RSA&apos;s Non-quantum Threat</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5cf5dc38-a801-4831-9856-ba448512b45e/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:31:41</itunes:duration>
      <itunes:summary>We are rejoined by Dr. Michele Mosca to explore the potential threat of RSA being broken even in the absence of a quantum computing attack.</itunes:summary>
      <itunes:subtitle>We are rejoined by Dr. Michele Mosca to explore the potential threat of RSA being broken even in the absence of a quantum computing attack.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>409</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2086592802</guid>
      <title>Root Causes 490: Chrome and Chromium</title>
      <description><![CDATA[<p>We define Chrome versus Chromium, explaining what each is and the difference between the two.</p>
]]></description>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We define Chrome versus Chromium, explaining what each is and the difference between the two.</p>
]]></content:encoded>
      <enclosure length="9639975" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/38f85809-8ddb-4655-936a-e1f28d5f2955/audio/577e34da-86d4-4215-953c-6f345dd6e8fa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 490: Chrome and Chromium</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/38f85809-8ddb-4655-936a-e1f28d5f2955/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:02</itunes:duration>
      <itunes:summary>We define Chrome versus Chromium, explaining what each is and the difference between the two.</itunes:summary>
      <itunes:subtitle>We define Chrome versus Chromium, explaining what each is and the difference between the two.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>408</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2084265159</guid>
      <title>Root Causes 489: Does AI Nullify E2EE?</title>
      <description><![CDATA[<p>Does AI kill end-to-end encryption?  There is a contention that the presence of AI agents in the workstream will render your confidential information visible outside the encrypted communication channels and therefore that E2EE is pointless.  We explore this argument.</p>
]]></description>
      <pubDate>Thu, 24 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Does AI kill end-to-end encryption?  There is a contention that the presence of AI agents in the workstream will render your confidential information visible outside the encrypted communication channels and therefore that E2EE is pointless.  We explore this argument.</p>
]]></content:encoded>
      <enclosure length="11597223" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/82245fd9-3287-4e09-8f49-a5791713dc34/audio/c8bce646-529c-4f92-86ad-6deb761e4242/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 489: Does AI Nullify E2EE?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/82245fd9-3287-4e09-8f49-a5791713dc34/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:04</itunes:duration>
      <itunes:summary>Does AI kill end-to-end encryption?  There is a contention that the presence of AI agents in the workstream will render your confidential information visible outside the encrypted communication channels and therefore that E2EE is pointless.  We explore this argument.</itunes:summary>
      <itunes:subtitle>Does AI kill end-to-end encryption?  There is a contention that the presence of AI agents in the workstream will render your confidential information visible outside the encrypted communication channels and therefore that E2EE is pointless.  We explore this argument.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>407</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2083237791</guid>
      <title>Root Causes 488: CABF Face-to-Face Meeting Update</title>
      <description><![CDATA[<p>We explain the major news items from the most recent CA/Browser Forum face-to-face meeting in Tokyo. Topics include MPIC, 47-day certificate term, and Temporary Restraining Orders.</p>
]]></description>
      <pubDate>Tue, 22 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We explain the major news items from the most recent CA/Browser Forum face-to-face meeting in Tokyo. Topics include MPIC, 47-day certificate term, and Temporary Restraining Orders.</p>
]]></content:encoded>
      <enclosure length="5400241" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/eeec4534-b1cc-4b7c-b786-b3048e1b73d8/audio/45040d5e-73fc-4daf-90d9-a923018e8526/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 488: CABF Face-to-Face Meeting Update</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/eeec4534-b1cc-4b7c-b786-b3048e1b73d8/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:05:37</itunes:duration>
      <itunes:summary>We explain the major news items from the most recent CA/Browser Forum face-to-face meeting in Tokyo. Topics include MPIC, 47-day certificate term, and Temporary Restraining Orders.</itunes:summary>
      <itunes:subtitle>We explain the major news items from the most recent CA/Browser Forum face-to-face meeting in Tokyo. Topics include MPIC, 47-day certificate term, and Temporary Restraining Orders.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>406</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2080599090</guid>
      <title>Root Causes 487: Security 2030</title>
      <description><![CDATA[<p>Jason and I take a peek forward at what we imagine IT security looks like in 2030.  Topics include PQC, ZTNA, &quot;green zones,&quot; deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.</p>
]]></description>
      <pubDate>Wed, 16 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason and I take a peek forward at what we imagine IT security looks like in 2030.  Topics include PQC, ZTNA, &quot;green zones,&quot; deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.</p>
]]></content:encoded>
      <enclosure length="44808231" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0635344d-4e67-42a7-819b-b76052b0df7a/audio/ea945389-1aaa-47d8-9ec5-8fa9d7030d2e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 487: Security 2030</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0635344d-4e67-42a7-819b-b76052b0df7a/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:46:40</itunes:duration>
      <itunes:summary>Jason and I take a peek forward at what we imagine IT security looks like in 2030.  Topics include PQC, ZTNA, &quot;green zones,&quot; deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.</itunes:summary>
      <itunes:subtitle>Jason and I take a peek forward at what we imagine IT security looks like in 2030.  Topics include PQC, ZTNA, &quot;green zones,&quot; deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>405</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2078508100</guid>
      <title>Root Causes 486: 47-day Maximum Term Ballot Passes CABF</title>
      <description><![CDATA[<p>Apple's ballot to step the maximum term for public SSL certificates down to 47 days has passed in the CA/Browser Forum.  We explain.</p>
]]></description>
      <pubDate>Mon, 14 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple's ballot to step the maximum term for public SSL certificates down to 47 days has passed in the CA/Browser Forum.  We explain.</p>
]]></content:encoded>
      <enclosure length="10754339" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0975f6eb-fa07-421d-8c0f-888181030c55/audio/bacca3e2-7858-4789-a733-7e7229630d22/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 486: 47-day Maximum Term Ballot Passes CABF</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0975f6eb-fa07-421d-8c0f-888181030c55/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:11</itunes:duration>
      <itunes:summary>Apple&apos;s ballot to step the maximum term for public SSL certificates down to 47 days has passed in the CA/Browser Forum.  We explain.</itunes:summary>
      <itunes:subtitle>Apple&apos;s ballot to step the maximum term for public SSL certificates down to 47 days has passed in the CA/Browser Forum.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>404</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2077377660</guid>
      <title>Root Causes 485: What Is Open MPIC?</title>
      <description><![CDATA[<p>Guest Dmitry Sharkov joins us to describe Open MPIC, the open-source project to help public CAs support MPIC.</p>
]]></description>
      <pubDate>Sun, 13 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Guest Dmitry Sharkov joins us to describe Open MPIC, the open-source project to help public CAs support MPIC.</p>
]]></content:encoded>
      <enclosure length="19657742" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5d0b0007-2960-43d6-b61a-bba3ba086db3/audio/a0eb61ca-bae4-4767-bd7c-edf36468003e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 485: What Is Open MPIC?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5d0b0007-2960-43d6-b61a-bba3ba086db3/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:20:28</itunes:duration>
      <itunes:summary>Guest Dmitry Sharkov joins us to describe Open MPIC, the open-source project to help public CAs support MPIC.</itunes:summary>
      <itunes:subtitle>Guest Dmitry Sharkov joins us to describe Open MPIC, the open-source project to help public CAs support MPIC.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>403</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2074742832</guid>
      <title>Root Causes 484: Multi Good Factor Authentication</title>
      <description><![CDATA[<p>We define multi good factor authentication, which is the idea that not all authentication factors are equal. We discuss the importance of considering authentication strength and the contextual nature of trust.</p>
]]></description>
      <pubDate>Wed, 9 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We define multi good factor authentication, which is the idea that not all authentication factors are equal. We discuss the importance of considering authentication strength and the contextual nature of trust.</p>
]]></content:encoded>
      <enclosure length="12269595" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/feedea70-e21e-4af9-95e6-1e651a85353d/audio/c6098125-1f0e-448a-9a82-9c3e6f0ea84c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 484: Multi Good Factor Authentication</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/feedea70-e21e-4af9-95e6-1e651a85353d/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:46</itunes:duration>
      <itunes:summary>We define multi good factor authentication, which is the idea that not all authentication factors are equal. We discuss the importance of considering authentication strength and the contextual nature of trust.</itunes:summary>
      <itunes:subtitle>We define multi good factor authentication, which is the idea that not all authentication factors are equal. We discuss the importance of considering authentication strength and the contextual nature of trust.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>402</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2073183752</guid>
      <title>Root Causes 483: Introducing the PQC Sandbox</title>
      <description><![CDATA[<p>We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo's new post quantum cryptography (PQC) sandbox.  The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.</p>
]]></description>
      <pubDate>Mon, 7 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo's new post quantum cryptography (PQC) sandbox.  The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.</p>
]]></content:encoded>
      <enclosure length="21769750" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c1f6e4b2-ec94-49d0-ab44-240b79d6e498/audio/ab8740ac-a14a-4776-9139-bb2fd25e1deb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 483: Introducing the PQC Sandbox</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c1f6e4b2-ec94-49d0-ab44-240b79d6e498/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:22:40</itunes:duration>
      <itunes:summary>We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo&apos;s new post quantum cryptography (PQC) sandbox.  The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.</itunes:summary>
      <itunes:subtitle>We are joined by repeat guest Bruno Coulliard of Crypto4A to introduce Sectigo&apos;s new post quantum cryptography (PQC) sandbox.  The PQC sandbox allows you to get quantum resistant certificates in your hands to understand how they work with your systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>401</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2069215320</guid>
      <title>Root Causes 482: Microsoft and PQC</title>
      <description><![CDATA[<p>In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA.  We discuss potential paths for Microsoft to take and their consequences.</p>
]]></description>
      <pubDate>Wed, 2 Apr 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA.  We discuss potential paths for Microsoft to take and their consequences.</p>
]]></content:encoded>
      <enclosure length="14070171" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2404613d-0b84-46b8-b9e9-f0d8bf5dbb86/audio/5c2e0f4b-41fd-4b71-9b54-e9e8abbcc6d9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 482: Microsoft and PQC</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2404613d-0b84-46b8-b9e9-f0d8bf5dbb86/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:14:38</itunes:duration>
      <itunes:summary>In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA.  We discuss potential paths for Microsoft to take and their consequences.</itunes:summary>
      <itunes:subtitle>In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA.  We discuss potential paths for Microsoft to take and their consequences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>400</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2067675776</guid>
      <title>Root Causes 481: What Is Protocol Ossification?</title>
      <description><![CDATA[<p>Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol.  This occurs when individual software components only partially support the capabilities that should be available.  We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.</p>
]]></description>
      <pubDate>Mon, 31 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol.  This occurs when individual software components only partially support the capabilities that should be available.  We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.</p>
]]></content:encoded>
      <enclosure length="11359911" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9ac451e7-b89e-447f-9ee1-efe2f6d4c5e6/audio/009b7f63-82e5-40ed-9cf4-ad1cd68ddb89/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 481: What Is Protocol Ossification?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9ac451e7-b89e-447f-9ee1-efe2f6d4c5e6/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:49</itunes:duration>
      <itunes:summary>Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol.  This occurs when individual software components only partially support the capabilities that should be available.  We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.</itunes:summary>
      <itunes:subtitle>Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol.  This occurs when individual software components only partially support the capabilities that should be available.  We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>399</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2062434016</guid>
      <title>Root Causes 480: White House PQC Executive Order</title>
      <description><![CDATA[<p>Many people believe that the Trump White House rescinded an important cybersecurity executive order from late days of the Biden administration.  We set the record straight.</p>
]]></description>
      <pubDate>Mon, 24 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Many people believe that the Trump White House rescinded an important cybersecurity executive order from late days of the Biden administration.  We set the record straight.</p>
]]></content:encoded>
      <enclosure length="9962907" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/57a54c4d-2b4a-4857-9ded-200d05613c4c/audio/be3c1db0-7434-48af-9fdd-43c2dfbbbf67/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 480: White House PQC Executive Order</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/57a54c4d-2b4a-4857-9ded-200d05613c4c/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:22</itunes:duration>
      <itunes:summary>Many people believe that the Trump White House rescinded an important cybersecurity executive order from late days of the Biden administration.  We set the record straight.</itunes:summary>
      <itunes:subtitle>Many people believe that the Trump White House rescinded an important cybersecurity executive order from late days of the Biden administration.  We set the record straight.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>398</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2059993472</guid>
      <title>Root Causes 479: AI Adversarial Machine Learning</title>
      <description><![CDATA[<p>In this episode we discuss the thinking on how adversaries can exploit the flaws in AI models to achieve unexpected and dangerous results.  We explore some potential paths of defense against attacks of this sort.</p>
]]></description>
      <pubDate>Fri, 21 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss the thinking on how adversaries can exploit the flaws in AI models to achieve unexpected and dangerous results.  We explore some potential paths of defense against attacks of this sort.</p>
]]></content:encoded>
      <enclosure length="12655516" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e6bf3eeb-74db-4f12-acfd-c67b396cf668/audio/89bb578d-b648-4a05-88c3-8941af3f67f6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 479: AI Adversarial Machine Learning</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e6bf3eeb-74db-4f12-acfd-c67b396cf668/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:10</itunes:duration>
      <itunes:summary>In this episode we discuss the thinking on how adversaries can exploit the flaws in AI models to achieve unexpected and dangerous results.  We explore some potential paths of defense against attacks of this sort.</itunes:summary>
      <itunes:subtitle>In this episode we discuss the thinking on how adversaries can exploit the flaws in AI models to achieve unexpected and dangerous results.  We explore some potential paths of defense against attacks of this sort.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>397</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2056487756</guid>
      <title>Root Causes 478: Should We All Switch from RSA to ECC?</title>
      <description><![CDATA[<p>RSA is under attack.  Even without the quantum threat, we face the possibility of smart new exploits reducing the viable RSA key space and rendering it unsafe.  In this episode we discuss the merits of choosing ECC over RSA as soon as today.</p>
]]></description>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>RSA is under attack.  Even without the quantum threat, we face the possibility of smart new exploits reducing the viable RSA key space and rendering it unsafe.  In this episode we discuss the merits of choosing ECC over RSA as soon as today.</p>
]]></content:encoded>
      <enclosure length="15384624" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/30370a31-2d62-4fa2-8ee7-6369273e21b4/audio/bfbe09cf-66ea-4b30-8373-709f6003ba45/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 478: Should We All Switch from RSA to ECC?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/30370a31-2d62-4fa2-8ee7-6369273e21b4/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:16:01</itunes:duration>
      <itunes:summary>RSA is under attack.  Even without the quantum threat, we face the possibility of smart new exploits reducing the viable RSA key space and rendering it unsafe.  In this episode we discuss the merits of choosing ECC over RSA as soon as today.</itunes:summary>
      <itunes:subtitle>RSA is under attack.  Even without the quantum threat, we face the possibility of smart new exploits reducing the viable RSA key space and rendering it unsafe.  In this episode we discuss the merits of choosing ECC over RSA as soon as today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>396</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2053413672</guid>
      <title>Root Causes 477: Comparative Security Philosophies</title>
      <description><![CDATA[<p>We discuss how various popular computing platforms approach security and highlight the differences between them.</p>
]]></description>
      <pubDate>Wed, 12 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss how various popular computing platforms approach security and highlight the differences between them.</p>
]]></content:encoded>
      <enclosure length="17154460" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/150c7e80-ebcc-4210-b5e5-a9a556ac2e76/audio/6e4390f5-3141-4c23-83b1-a15124f6b8f3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 477: Comparative Security Philosophies</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/150c7e80-ebcc-4210-b5e5-a9a556ac2e76/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:51</itunes:duration>
      <itunes:summary>We discuss how various popular computing platforms approach security and highlight the differences between them.</itunes:summary>
      <itunes:subtitle>We discuss how various popular computing platforms approach security and highlight the differences between them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>395</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2051426088</guid>
      <title>Root Causes 476: The Need for Security KPIs</title>
      <description><![CDATA[<p>Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.</p>
]]></description>
      <pubDate>Mon, 10 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.</p>
]]></content:encoded>
      <enclosure length="15910276" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/324ad7a7-00af-407f-b947-fda341913863/audio/abd42f84-f837-4251-9800-520cbfc6f6c6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 476: The Need for Security KPIs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/324ad7a7-00af-407f-b947-fda341913863/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:16:34</itunes:duration>
      <itunes:summary>Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.</itunes:summary>
      <itunes:subtitle>Jason recounts a 2024 Black Hat talk about the need for objective measurements of our IT defenses and whether the good guys or bad guys are winning. Jason breaks down how to define and measure the impact of security measures.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>394</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2048313032</guid>
      <title>Root Causes 475: Can Your AI Scheme Against You?</title>
      <description><![CDATA[<p>It's the stuff of science fiction! Interesting research shows how today's AI technology is capable of lying to and scheming against its human owners in service of its goals.</p>
]]></description>
      <pubDate>Wed, 5 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>It's the stuff of science fiction! Interesting research shows how today's AI technology is capable of lying to and scheming against its human owners in service of its goals.</p>
]]></content:encoded>
      <enclosure length="15319324" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/338db7e5-427f-48b9-b644-008dcff7beaa/audio/b919c208-1512-475a-b16a-96fd6dea34b9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 475: Can Your AI Scheme Against You?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/338db7e5-427f-48b9-b644-008dcff7beaa/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:15:56</itunes:duration>
      <itunes:summary>It&apos;s the stuff of science fiction! Interesting research shows how today&apos;s AI technology is capable of lying to and scheming against its human owners in service of its goals.</itunes:summary>
      <itunes:subtitle>It&apos;s the stuff of science fiction! Interesting research shows how today&apos;s AI technology is capable of lying to and scheming against its human owners in service of its goals.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>393</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2046049128</guid>
      <title>Root Causes 474: Explaining Shor&apos;s Algorithm</title>
      <description><![CDATA[<p>We talk a lot about Shor's Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor's algorithm for non-quantum physicists.</p>
]]></description>
      <pubDate>Sun, 2 Mar 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We talk a lot about Shor's Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor's algorithm for non-quantum physicists.</p>
]]></content:encoded>
      <enclosure length="20365066" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/64580f6c-7187-4e31-8ee7-0cc2dc0418b4/audio/b82f6edf-ee33-4045-8fc7-8bf8d57eede5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 474: Explaining Shor&apos;s Algorithm</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/64580f6c-7187-4e31-8ee7-0cc2dc0418b4/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:21:12</itunes:duration>
      <itunes:summary>We talk a lot about Shor&apos;s Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor&apos;s algorithm for non-quantum physicists.</itunes:summary>
      <itunes:subtitle>We talk a lot about Shor&apos;s Algorithm in our discussion of post quantum cryptography (PQC). In this episode Jason explains Shor&apos;s algorithm for non-quantum physicists.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>392</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2044298648</guid>
      <title>Root Causes 473: Does Security Software Lack Creativity?</title>
      <description><![CDATA[<p>Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.</p>
]]></description>
      <pubDate>Fri, 28 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.</p>
]]></content:encoded>
      <enclosure length="9750981" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/74d49509-ffe2-43e5-a7ab-78712cee2db5/audio/a9564b91-111d-42c9-8fc9-fda269ff6106/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 473: Does Security Software Lack Creativity?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/74d49509-ffe2-43e5-a7ab-78712cee2db5/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:08</itunes:duration>
      <itunes:summary>Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.</itunes:summary>
      <itunes:subtitle>Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>391</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2042806264</guid>
      <title>Root Causes 472: AI Offensive Modeling</title>
      <description><![CDATA[<p>AI tools are now available to perform red-teaming activity for DevSecOps. Such tools are soon to be table stakes in the constantly escalating IT security arms race. Join us to learn more.</p>
]]></description>
      <pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>AI tools are now available to perform red-teaming activity for DevSecOps. Such tools are soon to be table stakes in the constantly escalating IT security arms race. Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="10806172" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8e1307ae-90c1-468b-bd6d-303522ec762d/audio/056fbe12-5fa1-48bb-8639-cd7f67454ad8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 472: AI Offensive Modeling</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8e1307ae-90c1-468b-bd6d-303522ec762d/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:14</itunes:duration>
      <itunes:summary>AI tools are now available to perform red-teaming activity for DevSecOps. Such tools are soon to be table stakes in the constantly escalating IT security arms race. Join us to learn more.</itunes:summary>
      <itunes:subtitle>AI tools are now available to perform red-teaming activity for DevSecOps. Such tools are soon to be table stakes in the constantly escalating IT security arms race. Join us to learn more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>390</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2041444764</guid>
      <title>Root Causes 471: ACME for PQC</title>
      <description><![CDATA[<p>In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.</p>
]]></description>
      <pubDate>Sun, 23 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.</p>
]]></content:encoded>
      <enclosure length="20620070" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f2cbddd0-e707-4bf2-ba0b-ff698f9ce898/audio/125d663b-8a55-49ed-9621-2edb49846796/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 471: ACME for PQC</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f2cbddd0-e707-4bf2-ba0b-ff698f9ce898/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:21:28</itunes:duration>
      <itunes:summary>In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.</itunes:summary>
      <itunes:subtitle>In this episode, guest Alexandre Giron explains what is needed to support post quantum cryptography (PQC) with ACME.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>389</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2038025565</guid>
      <title>Root Causes 470: The MFA False Equivalency Fallacy</title>
      <description><![CDATA[<p>Not all forms of MFA are equally secure. In this episode we describe the differences between the more secure and less secure forms of MFA.</p>
]]></description>
      <pubDate>Wed, 19 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Not all forms of MFA are equally secure. In this episode we describe the differences between the more secure and less secure forms of MFA.</p>
]]></content:encoded>
      <enclosure length="11422507" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/de1c3d37-7e56-4ca3-90f1-ff2ec9b29764/audio/2035907a-7010-43c6-9790-8314be50cf1f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 470: The MFA False Equivalency Fallacy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/de1c3d37-7e56-4ca3-90f1-ff2ec9b29764/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:53</itunes:duration>
      <itunes:summary>Not all forms of MFA are equally secure. In this episode we describe the differences between the more secure and less secure forms of MFA.</itunes:summary>
      <itunes:subtitle>Not all forms of MFA are equally secure. In this episode we describe the differences between the more secure and less secure forms of MFA.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>388</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2036696852</guid>
      <title>Root Causes 469: The All or Nothing Fallacy in Cybersecurity</title>
      <description><![CDATA[<p>In this episode we explain the all-or-nothing fallacy in cybersecurity and how it's affecting debate in the WebPKI right now.</p>
]]></description>
      <pubDate>Mon, 17 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain the all-or-nothing fallacy in cybersecurity and how it's affecting debate in the WebPKI right now.</p>
]]></content:encoded>
      <enclosure length="6964001" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/187eec76-6725-4619-94cc-21a859e8c608/audio/373d8723-68ff-4f96-831b-ff89e2c90e52/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 469: The All or Nothing Fallacy in Cybersecurity</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/187eec76-6725-4619-94cc-21a859e8c608/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:14</itunes:duration>
      <itunes:summary>In this episode we explain the all-or-nothing fallacy in cybersecurity and how it&apos;s affecting debate in the WebPKI right now.</itunes:summary>
      <itunes:subtitle>In this episode we explain the all-or-nothing fallacy in cybersecurity and how it&apos;s affecting debate in the WebPKI right now.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>387</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2034665888</guid>
      <title>Root Causes 468: UK Demands New Backdoor from Apple</title>
      <description><![CDATA[<p>A new demand from the UK seeks complete access to all Apple cloud data housed in the UK, regardless of the data owners' citizenship and residency. We unpack this latest development in Government versus Encryption.</p>
]]></description>
      <pubDate>Fri, 14 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new demand from the UK seeks complete access to all Apple cloud data housed in the UK, regardless of the data owners' citizenship and residency. We unpack this latest development in Government versus Encryption.</p>
]]></content:encoded>
      <enclosure length="10023598" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f2cf3164-f115-4a9f-94eb-e124f87b7b58/audio/c8c681db-8f46-4d8a-b807-bbfb1f407c66/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 468: UK Demands New Backdoor from Apple</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f2cf3164-f115-4a9f-94eb-e124f87b7b58/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:25</itunes:duration>
      <itunes:summary>A new demand from the UK seeks complete access to all Apple cloud data housed in the UK, regardless of the data owners&apos; citizenship and residency. We unpack this latest development in Government versus Encryption.</itunes:summary>
      <itunes:subtitle>A new demand from the UK seeks complete access to all Apple cloud data housed in the UK, regardless of the data owners&apos; citizenship and residency. We unpack this latest development in Government versus Encryption.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>386</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2032792768</guid>
      <title>Root Causes 467: Decoupling Public from Private Use Cases</title>
      <description><![CDATA[<p>The past year has seen a great deal of focus on the use of public TLS certificates where private root certificates are actually the appropriate solution. In this episode we discuss the differences between these two use cases and what IT organizations can do about it.</p>
]]></description>
      <pubDate>Wed, 12 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The past year has seen a great deal of focus on the use of public TLS certificates where private root certificates are actually the appropriate solution. In this episode we discuss the differences between these two use cases and what IT organizations can do about it.</p>
]]></content:encoded>
      <enclosure length="9304673" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/34826982-73e7-4520-a048-d68fcfdeb8ea/audio/307ca7fc-237e-4287-927e-8edddc153ec6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 467: Decoupling Public from Private Use Cases</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/34826982-73e7-4520-a048-d68fcfdeb8ea/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:41</itunes:duration>
      <itunes:summary>The past year has seen a great deal of focus on the use of public TLS certificates where private root certificates are actually the appropriate solution. In this episode we discuss the differences between these two use cases and what IT organizations can do about it.</itunes:summary>
      <itunes:subtitle>The past year has seen a great deal of focus on the use of public TLS certificates where private root certificates are actually the appropriate solution. In this episode we discuss the differences between these two use cases and what IT organizations can do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>385</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2030851460</guid>
      <title>Root Causes 466: Apple Moves 47-day Ballot to CABF Vote</title>
      <description><![CDATA[<p>Apple is proceeding with a ballot that eventually will shorten SSL certificate maximum term to 47 days.  Accompanying the ballot, Apple released a statement explaining its intent with the ballot.  In this episode we unpack its statements.</p>
]]></description>
      <pubDate>Sun, 9 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple is proceeding with a ballot that eventually will shorten SSL certificate maximum term to 47 days.  Accompanying the ballot, Apple released a statement explaining its intent with the ballot.  In this episode we unpack its statements.</p>
]]></content:encoded>
      <enclosure length="30109089" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b3e14e62-47c7-4365-b0a4-6d06b637b400/audio/bfe24ba6-88a6-46c5-b249-9a9b302c604a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 466: Apple Moves 47-day Ballot to CABF Vote</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b3e14e62-47c7-4365-b0a4-6d06b637b400/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:31:21</itunes:duration>
      <itunes:summary>Apple is proceeding with a ballot that eventually will shorten SSL certificate maximum term to 47 days.  Accompanying the ballot, Apple released a statement explaining its intent with the ballot.  In this episode we unpack its statements.</itunes:summary>
      <itunes:subtitle>Apple is proceeding with a ballot that eventually will shorten SSL certificate maximum term to 47 days.  Accompanying the ballot, Apple released a statement explaining its intent with the ballot.  In this episode we unpack its statements.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>384</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2028856520</guid>
      <title>Root Causes 465: Twelve Bugzilla Sins for CAs to Avoid</title>
      <description><![CDATA[<p>In the wake of the Bugzilla Bloodbath, we list and describe twelve sins CAs commit on Bugzilla and its like, why they're detrimental, and how CAs should avoid them.</p>
]]></description>
      <pubDate>Fri, 7 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the wake of the Bugzilla Bloodbath, we list and describe twelve sins CAs commit on Bugzilla and its like, why they're detrimental, and how CAs should avoid them.</p>
]]></content:encoded>
      <enclosure length="41122983" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f01df679-f93d-40a1-87da-89eb0b2deb85/audio/0244d655-fc7c-4bfc-97a4-9e445e6a509d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 465: Twelve Bugzilla Sins for CAs to Avoid</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f01df679-f93d-40a1-87da-89eb0b2deb85/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:42:49</itunes:duration>
      <itunes:summary>In the wake of the Bugzilla Bloodbath, we list and describe twelve sins CAs commit on Bugzilla and its like, why they&apos;re detrimental, and how CAs should avoid them.</itunes:summary>
      <itunes:subtitle>In the wake of the Bugzilla Bloodbath, we list and describe twelve sins CAs commit on Bugzilla and its like, why they&apos;re detrimental, and how CAs should avoid them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>383</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2026921772</guid>
      <title>Root Causes 464: Defending Against Harvest and Decrypt</title>
      <description><![CDATA[<p>Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.</p>
]]></description>
      <pubDate>Wed, 5 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.</p>
]]></content:encoded>
      <enclosure length="9439108" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5af4b40c-84c9-4b27-b5a4-7b7bd19526a2/audio/b01f9ff9-4ad6-412f-a225-82f46f1eac63/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 464: Defending Against Harvest and Decrypt</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5af4b40c-84c9-4b27-b5a4-7b7bd19526a2/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:09:49</itunes:duration>
      <itunes:summary>Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.</itunes:summary>
      <itunes:subtitle>Harvest and decrypt is a well-known attack vector against traditional cryptography prior to PQC. In this episode, we discuss what enterprises should be doing today to defend themselves against harvest and decrypt.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>382</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2025470748</guid>
      <title>Root Causes 463: Cellular Networks Are Insecure</title>
      <description><![CDATA[<p>In this episode we explain that all cellular networks, contrary to popular belief, are fundamentally insecure.</p>
]]></description>
      <pubDate>Mon, 3 Feb 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain that all cellular networks, contrary to popular belief, are fundamentally insecure.</p>
]]></content:encoded>
      <enclosure length="11871387" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b7d4a868-55b1-4c47-8da5-f070989d2d41/audio/8ec4a060-2f04-478f-88f2-4e29f46e608b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 463: Cellular Networks Are Insecure</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b7d4a868-55b1-4c47-8da5-f070989d2d41/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:21</itunes:duration>
      <itunes:summary>In this episode we explain that all cellular networks, contrary to popular belief, are fundamentally insecure.</itunes:summary>
      <itunes:subtitle>In this episode we explain that all cellular networks, contrary to popular belief, are fundamentally insecure.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>381</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2022889132</guid>
      <title>Root Causes 462: Crypto War 3.0</title>
      <description><![CDATA[<p>In this episode we walk through the evolution of the war on cryptography, from the beginning up through today, terminating in what we call Crypto War 3.0.</p>
]]></description>
      <pubDate>Fri, 31 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we walk through the evolution of the war on cryptography, from the beginning up through today, terminating in what we call Crypto War 3.0.</p>
]]></content:encoded>
      <enclosure length="21408027" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7388e758-68e8-4586-8e2b-965db7af7ab6/audio/4dbfe807-4549-49f1-ac9f-79f31ec8fc07/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 462: Crypto War 3.0</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7388e758-68e8-4586-8e2b-965db7af7ab6/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:22:17</itunes:duration>
      <itunes:summary>In this episode we walk through the evolution of the war on cryptography, from the beginning up through today, terminating in what we call Crypto War 3.0.</itunes:summary>
      <itunes:subtitle>In this episode we walk through the evolution of the war on cryptography, from the beginning up through today, terminating in what we call Crypto War 3.0.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>380</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2021187861</guid>
      <title>Root Causes 461: Sectigo Acquires Entrust Public CA Business</title>
      <description><![CDATA[<p>Sectigo today announced the acquisition of the Entrust public CA business. Entrust will go forward as a Sectigo reseller. Join us to learn the details.</p>
]]></description>
      <pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Sectigo today announced the acquisition of the Entrust public CA business. Entrust will go forward as a Sectigo reseller. Join us to learn the details.</p>
]]></content:encoded>
      <enclosure length="10070071" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d17aadfd-518d-4d53-9f60-f15cc2b8a1c4/audio/4231fe9c-2bc1-46a7-979b-72fb3afc4dc4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 461: Sectigo Acquires Entrust Public CA Business</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d17aadfd-518d-4d53-9f60-f15cc2b8a1c4/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:28</itunes:duration>
      <itunes:summary>Sectigo today announced the acquisition of the Entrust public CA business. Entrust will go forward as a Sectigo reseller. Join us to learn the details.</itunes:summary>
      <itunes:subtitle>Sectigo today announced the acquisition of the Entrust public CA business. Entrust will go forward as a Sectigo reseller. Join us to learn the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>379</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2020337037</guid>
      <title>Root Causes 460: The State of PQC with Michele Mosca</title>
      <description><![CDATA[<p>In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.</p>
]]></description>
      <pubDate>Tue, 28 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.</p>
]]></content:encoded>
      <enclosure length="30550019" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5086dfb0-6df7-4b6e-8e32-1d0ab048f7fb/audio/f865ec78-0445-4c2f-bc26-7ad968d5ebb4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 460: The State of PQC with Michele Mosca</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5086dfb0-6df7-4b6e-8e32-1d0ab048f7fb/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:31:48</itunes:duration>
      <itunes:summary>In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.</itunes:summary>
      <itunes:subtitle>In this episode we are joined by Dr. Michela Mosca. We discuss his pioneering work identifying the need for post-quantum cryptography, where PQC stands today, and what the future may hold.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>378</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2017418741</guid>
      <title>Root Causes 459: 2024 Lookback - Shortening Certificate Lifespans &amp; DCV</title>
      <description><![CDATA[<p>2024 set in motion major changes for certificate lifespans and DCV.  In this episode we discuss the Apple 47-day proposal, stepping down certificate term, public versus private CA use cases, DCV reuse periods, MPIC, WHOIS, and other topics.</p>
]]></description>
      <pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>2024 set in motion major changes for certificate lifespans and DCV.  In this episode we discuss the Apple 47-day proposal, stepping down certificate term, public versus private CA use cases, DCV reuse periods, MPIC, WHOIS, and other topics.</p>
]]></content:encoded>
      <enclosure length="11852296" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dd77a025-8f08-4c4f-adb0-40f26634c81e/audio/d3faf785-f1a9-40ba-bc58-a2ecf6ee06cc/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 459: 2024 Lookback - Shortening Certificate Lifespans &amp; DCV</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dd77a025-8f08-4c4f-adb0-40f26634c81e/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:20</itunes:duration>
      <itunes:summary>2024 set in motion major changes for certificate lifespans and DCV.  In this episode we discuss the Apple 47-day proposal, stepping down certificate term, public versus private CA use cases, DCV reuse periods, MPIC, WHOIS, and other topics.</itunes:summary>
      <itunes:subtitle>2024 set in motion major changes for certificate lifespans and DCV.  In this episode we discuss the Apple 47-day proposal, stepping down certificate term, public versus private CA use cases, DCV reuse periods, MPIC, WHOIS, and other topics.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>377</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2013232903</guid>
      <title>Root Causes 458: Apple Extends Entrust Distrust to SMIME and VMC</title>
      <description><![CDATA[<p>Apple has added itself to the Entrust distrust and has extended this distrust to S/MIME and VMC.  We explain.</p>
]]></description>
      <pubDate>Sun, 19 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple has added itself to the Entrust distrust and has extended this distrust to S/MIME and VMC.  We explain.</p>
]]></content:encoded>
      <enclosure length="8454556" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ba5d0a0-aaa2-4094-8c81-16a57e2c7041/audio/ddb09ea6-c501-469d-9ff9-10fa946c6cd5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 458: Apple Extends Entrust Distrust to SMIME and VMC</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ba5d0a0-aaa2-4094-8c81-16a57e2c7041/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:08:47</itunes:duration>
      <itunes:summary>Apple has added itself to the Entrust distrust and has extended this distrust to S/MIME and VMC.  We explain.</itunes:summary>
      <itunes:subtitle>Apple has added itself to the Entrust distrust and has extended this distrust to S/MIME and VMC.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>376</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2011271827</guid>
      <title>Root Causes 457: 2024 Lookback - Guests</title>
      <description><![CDATA[<p>We had a remarkable year on the Root Causes podcast in terms of our guests. We look back at the extremely expert guests we were lucky to talk about in 2024.</p>
]]></description>
      <pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We had a remarkable year on the Root Causes podcast in terms of our guests. We look back at the extremely expert guests we were lucky to talk about in 2024.</p>
]]></content:encoded>
      <enclosure length="10999710" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/180771c7-60ee-497f-9884-87facba75205/audio/83a221f9-9f9f-48a1-82a1-83d0b6ae8374/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 457: 2024 Lookback - Guests</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/180771c7-60ee-497f-9884-87facba75205/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:27</itunes:duration>
      <itunes:summary>We had a remarkable year on the Root Causes podcast in terms of our guests. We look back at the extremely expert guests we were lucky to talk about in 2024.</itunes:summary>
      <itunes:subtitle>We had a remarkable year on the Root Causes podcast in terms of our guests. We look back at the extremely expert guests we were lucky to talk about in 2024.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>375</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2009041287</guid>
      <title>Root Causes 456: 2024 Lookback - Bugzilla Bloodbath</title>
      <description><![CDATA[<p>In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.</p>
]]></description>
      <pubDate>Tue, 14 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.</p>
]]></content:encoded>
      <enclosure length="10963227" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1161bb6f-ee6b-4017-b8ef-9f0cd110f229/audio/cef6e1f5-9b53-4a20-8c79-0a8db377ffa8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 456: 2024 Lookback - Bugzilla Bloodbath</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1161bb6f-ee6b-4017-b8ef-9f0cd110f229/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:24</itunes:duration>
      <itunes:summary>In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.</itunes:summary>
      <itunes:subtitle>In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>374</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2006139379</guid>
      <title>Root Causes 455: PQC Standardization in IETF</title>
      <description><![CDATA[<p>We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp's role, and more.</p>
]]></description>
      <pubDate>Wed, 8 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp's role, and more.</p>
]]></content:encoded>
      <enclosure length="34472855" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/46e97c3e-971d-4edb-81e6-67f7ea937687/audio/15bf6881-32d1-4024-ab22-cd800cec5b45/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 455: PQC Standardization in IETF</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/46e97c3e-971d-4edb-81e6-67f7ea937687/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:35:54</itunes:duration>
      <itunes:summary>We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp&apos;s role, and more.</itunes:summary>
      <itunes:subtitle>We talk with guest Sofia Celi of Brave Browser, who leads the IETF PQC standardization effort, about the process of setting standards for PQC-compatible digital certificates. We learn about expected timelines, hybrid strategies, the NIST PQC onramp&apos;s role, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>373</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1999604727</guid>
      <title>Root Causes 453: It Turns Out Monkeys Couldn&apos;t Type Shakespeare After All</title>
      <description><![CDATA[<p>The old adage states that a monkey in front of a keyboard, given enough time, could randomly type the works of Shakespeare. Apparently, someone ran the numbers and said not so much. We break it down and explain why we're discussing this on a PKI podcast.</p>
]]></description>
      <pubDate>Thu, 2 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The old adage states that a monkey in front of a keyboard, given enough time, could randomly type the works of Shakespeare. Apparently, someone ran the numbers and said not so much. We break it down and explain why we're discussing this on a PKI podcast.</p>
]]></content:encoded>
      <enclosure length="13649457" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/22679219-59c7-4833-905d-36b0ef575517/audio/47299b91-28b2-426a-8bc0-8d461db2528d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 453: It Turns Out Monkeys Couldn&apos;t Type Shakespeare After All</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/22679219-59c7-4833-905d-36b0ef575517/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:14:12</itunes:duration>
      <itunes:summary>The old adage states that a monkey in front of a keyboard, given enough time, could randomly type the works of Shakespeare. Apparently, someone ran the numbers and said not so much. We break it down and explain why we&apos;re discussing this on a PKI podcast.</itunes:summary>
      <itunes:subtitle>The old adage states that a monkey in front of a keyboard, given enough time, could randomly type the works of Shakespeare. Apparently, someone ran the numbers and said not so much. We break it down and explain why we&apos;re discussing this on a PKI podcast.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>371</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/2002529759</guid>
      <title>Root Causes 454: 2024 Lookback - Post quantum cryptography (PQC)</title>
      <description><![CDATA[<p>2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.</p>
]]></description>
      <pubDate>Thu, 2 Jan 2025 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.</p>
]]></content:encoded>
      <enclosure length="7450492" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4c95daec-0e43-4510-afb2-4be81c3d839a/audio/42c8cd99-dcd5-4334-a0c7-80c451690838/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 454: 2024 Lookback - Post quantum cryptography (PQC)</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4c95daec-0e43-4510-afb2-4be81c3d839a/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:07:45</itunes:duration>
      <itunes:summary>2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.</itunes:summary>
      <itunes:subtitle>2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>372</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1997604011</guid>
      <title>Root Causes 452: 2024 Predictions Scorecard</title>
      <description><![CDATA[<p>We go over our predictions for 2024 and score our ability as prognosticators.</p>
]]></description>
      <pubDate>Thu, 26 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We go over our predictions for 2024 and score our ability as prognosticators.</p>
]]></content:encoded>
      <enclosure length="10230591" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/413fd9d9-8331-4098-bd0c-7642f4ea5c96/audio/837e6c40-288b-4abb-b49e-8aa040bb8205/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 452: 2024 Predictions Scorecard</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/413fd9d9-8331-4098-bd0c-7642f4ea5c96/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:38</itunes:duration>
      <itunes:summary>We go over our predictions for 2024 and score our ability as prognosticators.</itunes:summary>
      <itunes:subtitle>We go over our predictions for 2024 and score our ability as prognosticators.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>370</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1994787347</guid>
      <title>Root Causes 451: A Year in CABF Ballots</title>
      <description><![CDATA[<p>It was a crazy year for CA/Browser Forum activity, with nearly three times the normal number of ballots.  Guest Martijn Katerbarg goes over the 32 CABF ballots from 2024.</p>
]]></description>
      <pubDate>Thu, 26 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>It was a crazy year for CA/Browser Forum activity, with nearly three times the normal number of ballots.  Guest Martijn Katerbarg goes over the 32 CABF ballots from 2024.</p>
]]></content:encoded>
      <enclosure length="33421474" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1e0d8e60-f512-42f3-ad2b-0dafbeed0568/audio/1da5b5a5-2579-4abf-b7f3-11f3f8172025/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 451: A Year in CABF Ballots</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1e0d8e60-f512-42f3-ad2b-0dafbeed0568/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:34:48</itunes:duration>
      <itunes:summary>It was a crazy year for CA/Browser Forum activity, with nearly three times the normal number of ballots.  Guest Martijn Katerbarg goes over the 32 CABF ballots from 2024.</itunes:summary>
      <itunes:subtitle>It was a crazy year for CA/Browser Forum activity, with nearly three times the normal number of ballots.  Guest Martijn Katerbarg goes over the 32 CABF ballots from 2024.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>369</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1992842707</guid>
      <title>Root Causes 450: 2025 Predictions</title>
      <description><![CDATA[<p>We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.</p>
]]></description>
      <pubDate>Mon, 23 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.</p>
]]></content:encoded>
      <enclosure length="46552353" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4bb9ac7-12de-459d-b817-df0323fa3693/audio/ff084a87-ac53-4bbf-ab75-4c2dfc57b01c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 450: 2025 Predictions</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4bb9ac7-12de-459d-b817-df0323fa3693/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:48:29</itunes:duration>
      <itunes:summary>We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.</itunes:summary>
      <itunes:subtitle>We make our 2025 predictions. Topics include maximum certificate term, AI, post-quantum cryptography (PQC), deep fakes, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>368</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1990147511</guid>
      <title>Root Causes 449: What Is a Quantum-safe HSM?</title>
      <description><![CDATA[<p>Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.</p>
]]></description>
      <pubDate>Wed, 18 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.</p>
]]></content:encoded>
      <enclosure length="22867222" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3551b865-8533-487b-853d-f69b97b68a34/audio/d0cb13f5-0a00-4d48-a10d-15d6d447c612/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 449: What Is a Quantum-safe HSM?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3551b865-8533-487b-853d-f69b97b68a34/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:23:48</itunes:duration>
      <itunes:summary>Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.</itunes:summary>
      <itunes:subtitle>Repeat guest Bruno Coulliard of Crypto4A joins us to define a quantum-safe (or PQC enabled) hardware security module.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>367</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1988187447</guid>
      <title>Root Causes 448: The Privilege of Being a Public CA</title>
      <description><![CDATA[<p>We go over Tim's September 2024 keynote speech at ENISA CA Day, &quot;The Privilege of Being a Public CA.&quot;</p>
]]></description>
      <pubDate>Tue, 17 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We go over Tim's September 2024 keynote speech at ENISA CA Day, &quot;The Privilege of Being a Public CA.&quot;</p>
]]></content:encoded>
      <enclosure length="24647468" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5aa8f688-45a7-4b4f-8746-81f04cad8fa5/audio/8f395117-44e9-421a-9391-abca5aa453cb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 448: The Privilege of Being a Public CA</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5aa8f688-45a7-4b4f-8746-81f04cad8fa5/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:39</itunes:duration>
      <itunes:summary>We go over Tim&apos;s September 2024 keynote speech at ENISA CA Day, &quot;The Privilege of Being a Public CA.&quot;</itunes:summary>
      <itunes:subtitle>We go over Tim&apos;s September 2024 keynote speech at ENISA CA Day, &quot;The Privilege of Being a Public CA.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>366</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1985034099</guid>
      <title>Root Causes 447: NIST Deprecates RSA-2048 and ECC 256</title>
      <description><![CDATA[<p>As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035.  We get into the details.</p>
]]></description>
      <pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035.  We get into the details.</p>
]]></content:encoded>
      <enclosure length="13230768" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fd617209-3c4f-4f71-b644-7080340909b7/audio/e7f0344a-5c94-4543-a9ed-dc3cffaf50b2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 447: NIST Deprecates RSA-2048 and ECC 256</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fd617209-3c4f-4f71-b644-7080340909b7/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:46</itunes:duration>
      <itunes:summary>As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035.  We get into the details.</itunes:summary>
      <itunes:subtitle>As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035.  We get into the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>365</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1982042035</guid>
      <title>Root Causes 446: Sectigo Assumes Five CABF Offices</title>
      <description><![CDATA[<p>Tim has stepped into the position of vice-chair of the CA/Browse Forum, and Sectigo now holds five chair or vice-chair positions in that body.  We explain how leadership is chosen, the offices Sectigo holds today, and some of our vision for CABF in the next two years.</p>
]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Tim has stepped into the position of vice-chair of the CA/Browse Forum, and Sectigo now holds five chair or vice-chair positions in that body.  We explain how leadership is chosen, the offices Sectigo holds today, and some of our vision for CABF in the next two years.</p>
]]></content:encoded>
      <enclosure length="12816534" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ff2248cc-466a-479e-b43e-9957d243db2a/audio/2400ce91-213d-4130-ac17-c68b063c123e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 446: Sectigo Assumes Five CABF Offices</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ff2248cc-466a-479e-b43e-9957d243db2a/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:20</itunes:duration>
      <itunes:summary>Tim has stepped into the position of vice-chair of the CA/Browse Forum, and Sectigo now holds five chair or vice-chair positions in that body.  We explain how leadership is chosen, the offices Sectigo holds today, and some of our vision for CABF in the next two years.</itunes:summary>
      <itunes:subtitle>Tim has stepped into the position of vice-chair of the CA/Browse Forum, and Sectigo now holds five chair or vice-chair positions in that body.  We explain how leadership is chosen, the offices Sectigo holds today, and some of our vision for CABF in the next two years.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>364</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1977851671</guid>
      <title>Root Causes 445: Seven Reasons to Shorten Certificate Lifespans</title>
      <description><![CDATA[<p>We take a deep dive into the seven reasons shorter certificate lifespans are better.</p>
]]></description>
      <pubDate>Mon, 9 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We take a deep dive into the seven reasons shorter certificate lifespans are better.</p>
]]></content:encoded>
      <enclosure length="26835514" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5b960e52-08cd-4767-9f69-ff9bb46f49a9/audio/b1df1f09-e9e4-45e3-a10c-67a751f679aa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 445: Seven Reasons to Shorten Certificate Lifespans</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5b960e52-08cd-4767-9f69-ff9bb46f49a9/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:27:56</itunes:duration>
      <itunes:summary>We take a deep dive into the seven reasons shorter certificate lifespans are better.</itunes:summary>
      <itunes:subtitle>We take a deep dive into the seven reasons shorter certificate lifespans are better.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>363</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1975298595</guid>
      <title>Root Causes 444: What Happens to the WebPKI if Google Sells Chrome?</title>
      <description><![CDATA[<p>We discuss how a potential break of Chrome from Google would affect the WebPKI.  We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.</p>
]]></description>
      <pubDate>Thu, 5 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss how a potential break of Chrome from Google would affect the WebPKI.  We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.</p>
]]></content:encoded>
      <enclosure length="18663229" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ef63ca39-d1ce-42d6-a946-754360292b25/audio/5cfc4e50-95d1-44ea-ae24-693c436d3faa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 444: What Happens to the WebPKI if Google Sells Chrome?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ef63ca39-d1ce-42d6-a946-754360292b25/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:19:25</itunes:duration>
      <itunes:summary>We discuss how a potential break of Chrome from Google would affect the WebPKI.  We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.</itunes:summary>
      <itunes:subtitle>We discuss how a potential break of Chrome from Google would affect the WebPKI.  We look at product changes, resourcing, post-quantum cryptography (PQC), innovation, moonshot initiatives, and other public CAs.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>362</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1972603803</guid>
      <title>Root Causes 443: Is MSCA Going Away?</title>
      <description><![CDATA[<p>In this episode we discuss the challenges for enterprises using Microsoft Active Directory Certificate Services (ADCS).</p>
]]></description>
      <pubDate>Sun, 1 Dec 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss the challenges for enterprises using Microsoft Active Directory Certificate Services (ADCS).</p>
]]></content:encoded>
      <enclosure length="12848312" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4a7d7b2a-6bad-4ce9-9f08-380a53eb1dfc/audio/3def46d4-38e1-4e6f-a421-4ffd1e6be75a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 443: Is MSCA Going Away?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4a7d7b2a-6bad-4ce9-9f08-380a53eb1dfc/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:13:22</itunes:duration>
      <itunes:summary>In this episode we discuss the challenges for enterprises using Microsoft Active Directory Certificate Services (ADCS).</itunes:summary>
      <itunes:subtitle>In this episode we discuss the challenges for enterprises using Microsoft Active Directory Certificate Services (ADCS).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>361</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1967062967</guid>
      <title>Root Causes 442: Apple Proposal to Reduce SSL Lifespan Updated</title>
      <description><![CDATA[<p>Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days.  We explain.</p>
]]></description>
      <pubDate>Mon, 25 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days.  We explain.</p>
]]></content:encoded>
      <enclosure length="21336632" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4a45e6e-4ff1-4719-9be2-0c5d50378188/audio/cbc1b881-e1a5-4c85-be1a-eec976e70263/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 442: Apple Proposal to Reduce SSL Lifespan Updated</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4a45e6e-4ff1-4719-9be2-0c5d50378188/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:22:13</itunes:duration>
      <itunes:summary>Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days.  We explain.</itunes:summary>
      <itunes:subtitle>Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>360</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1965001483</guid>
      <title>Root Causes 441: New White House Initiative Targets BGP</title>
      <description><![CDATA[<p>A new White House initiative requires that federal agencies need to create plans to thwart BGP attacks. We discuss, including Resource PKI (RPKI) and Multi-Perspective Issuance Corroboration (MPIC).</p>
]]></description>
      <pubDate>Fri, 22 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new White House initiative requires that federal agencies need to create plans to thwart BGP attacks. We discuss, including Resource PKI (RPKI) and Multi-Perspective Issuance Corroboration (MPIC).</p>
]]></content:encoded>
      <enclosure length="14294449" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/49b10bb8-31b3-49f6-9c38-64e025c2c153/audio/85960583-7d04-4c0d-ae1b-1ebac20c2c8c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 441: New White House Initiative Targets BGP</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/49b10bb8-31b3-49f6-9c38-64e025c2c153/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:14:52</itunes:duration>
      <itunes:summary>A new White House initiative requires that federal agencies need to create plans to thwart BGP attacks. We discuss, including Resource PKI (RPKI) and Multi-Perspective Issuance Corroboration (MPIC).</itunes:summary>
      <itunes:subtitle>A new White House initiative requires that federal agencies need to create plans to thwart BGP attacks. We discuss, including Resource PKI (RPKI) and Multi-Perspective Issuance Corroboration (MPIC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>359</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1961462419</guid>
      <title>Root Causes 440: Public Key Directories</title>
      <description><![CDATA[<p>We talk about public key directories and complicating factors such as Tailscale, VPN, TOR, Cloudflare, and Zero Trust.</p>
]]></description>
      <pubDate>Mon, 18 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We talk about public key directories and complicating factors such as Tailscale, VPN, TOR, Cloudflare, and Zero Trust.</p>
]]></content:encoded>
      <enclosure length="12453582" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e13aef31-7e15-4263-9207-d7ce8405332d/audio/b184702b-a097-4c23-b688-715a7a7c400a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 440: Public Key Directories</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e13aef31-7e15-4263-9207-d7ce8405332d/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:12:57</itunes:duration>
      <itunes:summary>We talk about public key directories and complicating factors such as Tailscale, VPN, TOR, Cloudflare, and Zero Trust.</itunes:summary>
      <itunes:subtitle>We talk about public key directories and complicating factors such as Tailscale, VPN, TOR, Cloudflare, and Zero Trust.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>358</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1959260607</guid>
      <title>Root Causes 439: PQC Onramp Narrowed Down to 15 Candidates</title>
      <description><![CDATA[<p>NIST has narrowed its PQC onramp contest to 15 candidates.  We go over who remains and the makeup of the remaining candidates.</p>
]]></description>
      <pubDate>Fri, 15 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST has narrowed its PQC onramp contest to 15 candidates.  We go over who remains and the makeup of the remaining candidates.</p>
]]></content:encoded>
      <enclosure length="16540473" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d0f0c16a-096b-4868-a158-bc0121e27c4c/audio/d434531e-315f-4be6-a53a-5a901d04bac9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 439: PQC Onramp Narrowed Down to 15 Candidates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d0f0c16a-096b-4868-a158-bc0121e27c4c/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:17:13</itunes:duration>
      <itunes:summary>NIST has narrowed its PQC onramp contest to 15 candidates.  We go over who remains and the makeup of the remaining candidates.</itunes:summary>
      <itunes:subtitle>NIST has narrowed its PQC onramp contest to 15 candidates.  We go over who remains and the makeup of the remaining candidates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>357</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1956475447</guid>
      <title>Root Causes 438: PQC Is an Existential Requirement</title>
      <description><![CDATA[<p>Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.</p>
]]></description>
      <pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.</p>
]]></content:encoded>
      <enclosure length="27202198" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dd3fba8b-5292-499f-a0a8-f23466cea45e/audio/f67d9936-2c85-4f0f-b55b-be6d8b949c0e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 438: PQC Is an Existential Requirement</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dd3fba8b-5292-499f-a0a8-f23466cea45e/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:28:19</itunes:duration>
      <itunes:summary>Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.</itunes:summary>
      <itunes:subtitle>Repeat guest Bruno Couillard argues that cryptography is part of the foundational fabric of our lives and that the transition to PQC is an existential requirement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>356</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1950186751</guid>
      <title>Root Causes 437: Don&apos;t Blame the Linter</title>
      <description><![CDATA[<p>Linters are essential tools for maintaining quality of certificate issuance. Public open-source linters are available to help CAs assure compliance. As a result, CAs have begun attributing gaps in coverage by public linters as the root cause for misissuance events. We explain why this is faulty reasoning.</p>
]]></description>
      <pubDate>Tue, 5 Nov 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Linters are essential tools for maintaining quality of certificate issuance. Public open-source linters are available to help CAs assure compliance. As a result, CAs have begun attributing gaps in coverage by public linters as the root cause for misissuance events. We explain why this is faulty reasoning.</p>
]]></content:encoded>
      <enclosure length="10914481" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6ef7e0bd-418a-428c-81ec-dcc805365e62/audio/f9a8550a-90a1-4257-a0ec-50ec26903218/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 437: Don&apos;t Blame the Linter</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6ef7e0bd-418a-428c-81ec-dcc805365e62/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:11:21</itunes:duration>
      <itunes:summary>Linters are essential tools for maintaining quality of certificate issuance. Public open-source linters are available to help CAs assure compliance. As a result, CAs have begun attributing gaps in coverage by public linters as the root cause for misissuance events. We explain why this is faulty reasoning.</itunes:summary>
      <itunes:subtitle>Linters are essential tools for maintaining quality of certificate issuance. Public open-source linters are available to help CAs assure compliance. As a result, CAs have begun attributing gaps in coverage by public linters as the root cause for misissuance events. We explain why this is faulty reasoning.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>355</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1945040723</guid>
      <title>Root Causes 436: Formal Proofs</title>
      <description><![CDATA[<p>Formal proofs are critical to cryptography. We discuss how better processes and AI can accelerate formal proofs of cryptographic concepts.</p>
]]></description>
      <pubDate>Tue, 29 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Formal proofs are critical to cryptography. We discuss how better processes and AI can accelerate formal proofs of cryptographic concepts.</p>
]]></content:encoded>
      <enclosure length="9974067" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3b6461a6-4332-460e-a274-eeb9277da6d0/audio/fa4f38e5-9f02-43a1-8068-208b78e84953/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 436: Formal Proofs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3b6461a6-4332-460e-a274-eeb9277da6d0/3000x3000/artworks-yz8s2cege5vfwqzy-thtzlg-t3000x3000.png?aid=rss_feed"/>
      <itunes:duration>00:10:22</itunes:duration>
      <itunes:summary>Formal proofs are critical to cryptography. We discuss how better processes and AI can accelerate formal proofs of cryptographic concepts.</itunes:summary>
      <itunes:subtitle>Formal proofs are critical to cryptography. We discuss how better processes and AI can accelerate formal proofs of cryptographic concepts.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>354</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1941928931</guid>
      <title>Root Causes 435: The PQC &quot;Q Day&quot; Is Not That Simple</title>
      <description><![CDATA[<p>The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called &quot;Q day.&quot; In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a &quot;cryptographically relevant quantum computer&quot; really will be.</p>
]]></description>
      <pubDate>Fri, 25 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called &quot;Q day.&quot; In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a &quot;cryptographically relevant quantum computer&quot; really will be.</p>
]]></content:encoded>
      <enclosure length="18982699" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/63357eaf-0f1a-47c0-ab79-94ac488513f6/audio/58e2685c-0212-4499-bbe4-fc3e36c88a53/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 435: The PQC &quot;Q Day&quot; Is Not That Simple</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/63357eaf-0f1a-47c0-ab79-94ac488513f6/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:45</itunes:duration>
      <itunes:summary>The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called &quot;Q day.&quot; In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a &quot;cryptographically relevant quantum computer&quot; really will be.</itunes:summary>
      <itunes:subtitle>The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called &quot;Q day.&quot; In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a &quot;cryptographically relevant quantum computer&quot; really will be.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>353</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1939617755</guid>
      <title>Root Causes 434: Did Researchers Break AES Using Quantum Annealing?</title>
      <description><![CDATA[<p>News reports claim Chinese researchers broke AES with a quantum annealing computer. We clarify the details and talk about the implications of this reported discovery.</p>
]]></description>
      <pubDate>Tue, 22 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>News reports claim Chinese researchers broke AES with a quantum annealing computer. We clarify the details and talk about the implications of this reported discovery.</p>
]]></content:encoded>
      <enclosure length="11265853" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a91b5977-4155-4dba-8185-b207c8269e4a/audio/d4cd7152-be2e-4387-acf4-1c8d406a4a11/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 434: Did Researchers Break AES Using Quantum Annealing?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a91b5977-4155-4dba-8185-b207c8269e4a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:43</itunes:duration>
      <itunes:summary>News reports claim Chinese researchers broke AES with a quantum annealing computer. We clarify the details and talk about the implications of this reported discovery.</itunes:summary>
      <itunes:subtitle>News reports claim Chinese researchers broke AES with a quantum annealing computer. We clarify the details and talk about the implications of this reported discovery.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>352</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1936652567</guid>
      <title>Root Causes 433: Will AI Eat All the Electricity?</title>
      <description><![CDATA[<p>We explore the question of whether or not we have enough electricity to fuel AI's expected growth.</p>
]]></description>
      <pubDate>Thu, 17 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We explore the question of whether or not we have enough electricity to fuel AI's expected growth.</p>
]]></content:encoded>
      <enclosure length="10065892" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/974dd7c7-be5c-4eb7-b247-0eff97bad228/audio/b56a9ba5-ba0b-46ab-a010-57526e8a0225/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 433: Will AI Eat All the Electricity?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/974dd7c7-be5c-4eb7-b247-0eff97bad228/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:28</itunes:duration>
      <itunes:summary>We explore the question of whether or not we have enough electricity to fuel AI&apos;s expected growth.</itunes:summary>
      <itunes:subtitle>We explore the question of whether or not we have enough electricity to fuel AI&apos;s expected growth.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>351</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1934900699</guid>
      <title>Root Causes 432: Apple Floats New Short-lived Certificate Proposal</title>
      <description><![CDATA[<p>Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027.  We share the details.</p>
]]></description>
      <pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027.  We share the details.</p>
]]></content:encoded>
      <enclosure length="25296060" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b963f82f-6fc6-4e6e-a2ca-52da9c961484/audio/bd5d68fd-917d-4365-afd0-38e93ccf6e0a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 432: Apple Floats New Short-lived Certificate Proposal</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b963f82f-6fc6-4e6e-a2ca-52da9c961484/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:20</itunes:duration>
      <itunes:summary>Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027.  We share the details.</itunes:summary>
      <itunes:subtitle>Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027.  We share the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>350</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1933401902</guid>
      <title>Root Causes 431: New Mozilla Proposal to Combat Delayed Revocation</title>
      <description><![CDATA[<p>Deliberate delay of mandatory revocations has plagued the WebPKI in 2024. A new proposed policy from Mozilla stands to eliminate most of this behavior. In this episode we go over the proposal and explain its potential consequences.</p>
]]></description>
      <pubDate>Fri, 11 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Deliberate delay of mandatory revocations has plagued the WebPKI in 2024. A new proposed policy from Mozilla stands to eliminate most of this behavior. In this episode we go over the proposal and explain its potential consequences.</p>
]]></content:encoded>
      <enclosure length="27057085" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c9302bef-5a87-4f9d-80c2-59d3b3b29e06/audio/c849692d-15ab-4ee2-aa3c-0f52912d7959/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 431: New Mozilla Proposal to Combat Delayed Revocation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c9302bef-5a87-4f9d-80c2-59d3b3b29e06/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:10</itunes:duration>
      <itunes:summary>Deliberate delay of mandatory revocations has plagued the WebPKI in 2024. A new proposed policy from Mozilla stands to eliminate most of this behavior. In this episode we go over the proposal and explain its potential consequences.</itunes:summary>
      <itunes:subtitle>Deliberate delay of mandatory revocations has plagued the WebPKI in 2024. A new proposed policy from Mozilla stands to eliminate most of this behavior. In this episode we go over the proposal and explain its potential consequences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>349</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1931716754</guid>
      <title>Root Causes 430: How Does a TLS Handshake Work?</title>
      <description><![CDATA[<p>In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.</p>
]]></description>
      <pubDate>Wed, 9 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.</p>
]]></content:encoded>
      <enclosure length="13959594" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/061eea89-f104-4cb9-82fd-7db7cd0fdb67/audio/7daa98e9-fd77-4932-a775-4b48019e86c3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 430: How Does a TLS Handshake Work?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/061eea89-f104-4cb9-82fd-7db7cd0fdb67/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:31</itunes:duration>
      <itunes:summary>In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.</itunes:summary>
      <itunes:subtitle>In this episode we give a high-level explanation of what happens in a TLS 1.3 handshake and then discuss what will happen when PQC is included.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>348</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1931100317</guid>
      <title>Root Causes 429: ServiceNow Outage Due to Expired Root Certificate</title>
      <description><![CDATA[<p>A ServiceNow private CA root expired, creating outages across hundreds of enterprises. We explain what appears to have gone on.</p>
]]></description>
      <pubDate>Tue, 8 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A ServiceNow private CA root expired, creating outages across hundreds of enterprises. We explain what appears to have gone on.</p>
]]></content:encoded>
      <enclosure length="6792253" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c337a2f4-bbc8-4ab1-a4a1-c69a56b27b99/audio/116abb5f-5c82-4282-acc6-17f1405bb091/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 429: ServiceNow Outage Due to Expired Root Certificate</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c337a2f4-bbc8-4ab1-a4a1-c69a56b27b99/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>A ServiceNow private CA root expired, creating outages across hundreds of enterprises. We explain what appears to have gone on.</itunes:summary>
      <itunes:subtitle>A ServiceNow private CA root expired, creating outages across hundreds of enterprises. We explain what appears to have gone on.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>347</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1928975426</guid>
      <title>Root Causes 428: .MOBI Attack Puts WHOIS-based DCV into Question</title>
      <description><![CDATA[<p>White hat researchers managed to take over WHOIS for the .mobi TLD. Among other things, this discovery foretells the death of WHOIS as a valid email source for Domain Control Validation (DCV).</p>
]]></description>
      <pubDate>Fri, 4 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>White hat researchers managed to take over WHOIS for the .mobi TLD. Among other things, this discovery foretells the death of WHOIS as a valid email source for Domain Control Validation (DCV).</p>
]]></content:encoded>
      <enclosure length="16493630" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ee2bdc9c-287a-4afd-8a49-14c9bccfb5dd/audio/fd4d2cbc-2dbc-4fd3-b809-a31a8a424789/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 428: .MOBI Attack Puts WHOIS-based DCV into Question</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ee2bdc9c-287a-4afd-8a49-14c9bccfb5dd/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:10</itunes:duration>
      <itunes:summary>White hat researchers managed to take over WHOIS for the .mobi TLD. Among other things, this discovery foretells the death of WHOIS as a valid email source for Domain Control Validation (DCV).</itunes:summary>
      <itunes:subtitle>White hat researchers managed to take over WHOIS for the .mobi TLD. Among other things, this discovery foretells the death of WHOIS as a valid email source for Domain Control Validation (DCV).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>346</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1927650551</guid>
      <title>Root Causes 427: Mapping CLM to NIST CSF 2.0</title>
      <description><![CDATA[<p>In this episode we map the contributions of Certificate Lifecycle Management into the new NIST Cybersecurity Framework 2.0.</p>
]]></description>
      <pubDate>Tue, 1 Oct 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we map the contributions of Certificate Lifecycle Management into the new NIST Cybersecurity Framework 2.0.</p>
]]></content:encoded>
      <enclosure length="15153251" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7cee06ef-b6b2-4edf-a1e9-518eff344997/audio/40dbb9a5-ae5a-4569-9904-625ec4d02757/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 427: Mapping CLM to NIST CSF 2.0</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7cee06ef-b6b2-4edf-a1e9-518eff344997/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:46</itunes:duration>
      <itunes:summary>In this episode we map the contributions of Certificate Lifecycle Management into the new NIST Cybersecurity Framework 2.0.</itunes:summary>
      <itunes:subtitle>In this episode we map the contributions of Certificate Lifecycle Management into the new NIST Cybersecurity Framework 2.0.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>345</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1926367928</guid>
      <title>Root Causes 426: Expired Certificate Takes Down Bank of England</title>
      <description><![CDATA[<p>A certificate expiration is now known to have created July's outage of Bank of England.  Join us as we shake our heads in amazement yet again.</p>
]]></description>
      <pubDate>Mon, 30 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A certificate expiration is now known to have created July's outage of Bank of England.  Join us as we shake our heads in amazement yet again.</p>
]]></content:encoded>
      <enclosure length="7410106" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5669116d-e115-4442-b8d6-463ed6351b2c/audio/7413fad9-ac42-4664-b3f2-e508c3706ce1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 426: Expired Certificate Takes Down Bank of England</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5669116d-e115-4442-b8d6-463ed6351b2c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:42</itunes:duration>
      <itunes:summary>A certificate expiration is now known to have created July&apos;s outage of Bank of England.  Join us as we shake our heads in amazement yet again.</itunes:summary>
      <itunes:subtitle>A certificate expiration is now known to have created July&apos;s outage of Bank of England.  Join us as we shake our heads in amazement yet again.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>344</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1924900076</guid>
      <title>Root Causes 425: PQC Requirements for Voting Systems</title>
      <description><![CDATA[<p>In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.</p>
]]></description>
      <pubDate>Fri, 27 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.</p>
]]></content:encoded>
      <enclosure length="10460975" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bb025443-403c-4d2c-be11-ad2b31920513/audio/c4edcbd8-2c11-4f50-a6a7-6bb07da997c1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 425: PQC Requirements for Voting Systems</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bb025443-403c-4d2c-be11-ad2b31920513/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:53</itunes:duration>
      <itunes:summary>In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.</itunes:summary>
      <itunes:subtitle>In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>343</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1923108524</guid>
      <title>Root Causes 424: Using LoRA IoT Protocol for Clandestine Communications</title>
      <description><![CDATA[<p>In this episode we describe the LoRA protocol, which allows IoT devices to communicate securely without using a cellular network, and how it can be used for secret communications.</p>
]]></description>
      <pubDate>Wed, 25 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe the LoRA protocol, which allows IoT devices to communicate securely without using a cellular network, and how it can be used for secret communications.</p>
]]></content:encoded>
      <enclosure length="11271198" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1850753-0a46-4fbe-a291-19c890725adc/audio/e2c5a343-f144-4159-9ca4-1d73e79a3718/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 424: Using LoRA IoT Protocol for Clandestine Communications</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1850753-0a46-4fbe-a291-19c890725adc/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:43</itunes:duration>
      <itunes:summary>In this episode we describe the LoRA protocol, which allows IoT devices to communicate securely without using a cellular network, and how it can be used for secret communications.</itunes:summary>
      <itunes:subtitle>In this episode we describe the LoRA protocol, which allows IoT devices to communicate securely without using a cellular network, and how it can be used for secret communications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>342</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1920227681</guid>
      <title>Root Causes 423: Is a Certificate Software or a Service?</title>
      <description><![CDATA[<p>In this episode we discuss the dual nature of a public certificate as both a file and part of a holistic service that lasts until its expiration. We discuss revocation checking, CT logging, GAAP accounting, linters, certificate tracking tools, Certificate Lifecycle Management, standards bodies, post-quantum cryptography, and subscription models.</p>
]]></description>
      <pubDate>Fri, 20 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss the dual nature of a public certificate as both a file and part of a holistic service that lasts until its expiration. We discuss revocation checking, CT logging, GAAP accounting, linters, certificate tracking tools, Certificate Lifecycle Management, standards bodies, post-quantum cryptography, and subscription models.</p>
]]></content:encoded>
      <enclosure length="17736272" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e797eee0-c0f8-44a2-9a1b-d43215c7d961/audio/b12ea69f-2623-4fce-bc45-394476265fb8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 423: Is a Certificate Software or a Service?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e797eee0-c0f8-44a2-9a1b-d43215c7d961/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:28</itunes:duration>
      <itunes:summary>In this episode we discuss the dual nature of a public certificate as both a file and part of a holistic service that lasts until its expiration. We discuss revocation checking, CT logging, GAAP accounting, linters, certificate tracking tools, Certificate Lifecycle Management, standards bodies, post-quantum cryptography, and subscription models.</itunes:summary>
      <itunes:subtitle>In this episode we discuss the dual nature of a public certificate as both a file and part of a holistic service that lasts until its expiration. We discuss revocation checking, CT logging, GAAP accounting, linters, certificate tracking tools, Certificate Lifecycle Management, standards bodies, post-quantum cryptography, and subscription models.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>341</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1919415614</guid>
      <title>Root Causes 422: New Date for Entrust Distrust</title>
      <description><![CDATA[<p>The Chrome root program has changed the date for the Entrust distrust.  Join us to get the details.</p>
]]></description>
      <pubDate>Thu, 19 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The Chrome root program has changed the date for the Entrust distrust.  Join us to get the details.</p>
]]></content:encoded>
      <enclosure length="4291227" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/17925a72-0022-4e97-a10d-0f6d36da7711/audio/b7b20b96-f657-4a6a-9768-375bb3a6f41b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 422: New Date for Entrust Distrust</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/17925a72-0022-4e97-a10d-0f6d36da7711/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:04:27</itunes:duration>
      <itunes:summary>The Chrome root program has changed the date for the Entrust distrust.  Join us to get the details.</itunes:summary>
      <itunes:subtitle>The Chrome root program has changed the date for the Entrust distrust.  Join us to get the details.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>340</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1917684677</guid>
      <title>Root Causes 421: FIDO 2 Implementation Problems</title>
      <description><![CDATA[<p>White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn).  We explain.</p>
]]></description>
      <pubDate>Mon, 16 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn).  We explain.</p>
]]></content:encoded>
      <enclosure length="8129116" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/00ed5d15-feb0-4b27-8df6-8859a08c472d/audio/84e26415-0f66-404c-8343-48557b389a1d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 421: FIDO 2 Implementation Problems</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/00ed5d15-feb0-4b27-8df6-8859a08c472d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:27</itunes:duration>
      <itunes:summary>White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn).  We explain.</itunes:summary>
      <itunes:subtitle>White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn).  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>339</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1916210366</guid>
      <title>Root Causes 420: New Side Channel Attack Against YubiKeys</title>
      <description><![CDATA[<p>EUCLEAK, a newly revealed side channel vulnerability, can clone the contents of a YubiKey.  We talk about the attack and its significance.</p>
]]></description>
      <pubDate>Fri, 13 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>EUCLEAK, a newly revealed side channel vulnerability, can clone the contents of a YubiKey.  We talk about the attack and its significance.</p>
]]></content:encoded>
      <enclosure length="12220468" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a909c085-6f45-4c72-98b7-37b743cc9a8d/audio/5f4f4974-236f-4e7b-b994-67af283685c1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 420: New Side Channel Attack Against YubiKeys</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a909c085-6f45-4c72-98b7-37b743cc9a8d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:43</itunes:duration>
      <itunes:summary>EUCLEAK, a newly revealed side channel vulnerability, can clone the contents of a YubiKey.  We talk about the attack and its significance.</itunes:summary>
      <itunes:subtitle>EUCLEAK, a newly revealed side channel vulnerability, can clone the contents of a YubiKey.  We talk about the attack and its significance.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>338</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1914084548</guid>
      <title>Root Causes 419: What Happens to Vendors Who Don&apos;t Support ACME When 90-day Certificates Come?</title>
      <description><![CDATA[<p>Though it is the closest thing to an industry-standard API, there are still products and operating systems that don't support ACME. In this episode we explore what happens to these products once 90-day SSL certificates become the requirement.</p>
]]></description>
      <pubDate>Sun, 8 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Though it is the closest thing to an industry-standard API, there are still products and operating systems that don't support ACME. In this episode we explore what happens to these products once 90-day SSL certificates become the requirement.</p>
]]></content:encoded>
      <enclosure length="15595230" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/95e6c2b5-95c1-4fbe-a20c-3adc8940512e/audio/d750cbe6-e7da-484e-a6a6-9a66f9d4f9a5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 419: What Happens to Vendors Who Don&apos;t Support ACME When 90-day Certificates Come?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/95e6c2b5-95c1-4fbe-a20c-3adc8940512e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:14</itunes:duration>
      <itunes:summary>Though it is the closest thing to an industry-standard API, there are still products and operating systems that don&apos;t support ACME. In this episode we explore what happens to these products once 90-day SSL certificates become the requirement.</itunes:summary>
      <itunes:subtitle>Though it is the closest thing to an industry-standard API, there are still products and operating systems that don&apos;t support ACME. In this episode we explore what happens to these products once 90-day SSL certificates become the requirement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>337</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1911607607</guid>
      <title>Root Causes 418: Moving from Cryptographic Homogeneity to Cryptographic Heterogeneity</title>
      <description><![CDATA[<p>One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.</p>
]]></description>
      <pubDate>Fri, 6 Sep 2024 16:48:26 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.</p>
]]></content:encoded>
      <enclosure length="17688241" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cab72e6e-920e-4248-9309-51a89dfc8c95/audio/2013a720-dbd3-4696-875c-96ad3fe30d4c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 418: Moving from Cryptographic Homogeneity to Cryptographic Heterogeneity</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cab72e6e-920e-4248-9309-51a89dfc8c95/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:25</itunes:duration>
      <itunes:summary>One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.</itunes:summary>
      <itunes:subtitle>One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>336</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1909670810</guid>
      <title>Root Causes 417: Introducing pkimetal, the PKI Meta-linter</title>
      <description><![CDATA[<p>We introduce pkimetal, an open source project from Rob Stradling that allows CA to write to many popular linters with a single integration.  We explain the importance and pitfalls of linters and how pkimetal improves linter implementation.</p>
]]></description>
      <pubDate>Mon, 2 Sep 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We introduce pkimetal, an open source project from Rob Stradling that allows CA to write to many popular linters with a single integration.  We explain the importance and pitfalls of linters and how pkimetal improves linter implementation.</p>
]]></content:encoded>
      <enclosure length="8403997" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5b73213d-60f2-41df-bcd2-10e57cd851f6/audio/0c3170e3-515d-4afd-b7c2-af6242728b84/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 417: Introducing pkimetal, the PKI Meta-linter</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5b73213d-60f2-41df-bcd2-10e57cd851f6/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:44</itunes:duration>
      <itunes:summary>We introduce pkimetal, an open source project from Rob Stradling that allows CA to write to many popular linters with a single integration.  We explain the importance and pitfalls of linters and how pkimetal improves linter implementation.</itunes:summary>
      <itunes:subtitle>We introduce pkimetal, an open source project from Rob Stradling that allows CA to write to many popular linters with a single integration.  We explain the importance and pitfalls of linters and how pkimetal improves linter implementation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>335</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1907262590</guid>
      <title>Root Causes 416: SSL Subscriber Uses a Restraining Order to Prevent Revocation</title>
      <description><![CDATA[<p>An enterprise SSL subscriber recently used a Temporary Restraining Order to prevent the proper revocation of misissued certificates. We explain what happened, why it's deeply problematic, and how the industry might consider responding.</p>
]]></description>
      <pubDate>Thu, 29 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>An enterprise SSL subscriber recently used a Temporary Restraining Order to prevent the proper revocation of misissued certificates. We explain what happened, why it's deeply problematic, and how the industry might consider responding.</p>
]]></content:encoded>
      <enclosure length="21752521" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3735d879-b30e-4ac3-a776-52521b085f56/audio/3541772a-fbba-4a7e-834a-d83c6bef2d2f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 416: SSL Subscriber Uses a Restraining Order to Prevent Revocation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3735d879-b30e-4ac3-a776-52521b085f56/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:39</itunes:duration>
      <itunes:summary>An enterprise SSL subscriber recently used a Temporary Restraining Order to prevent the proper revocation of misissued certificates. We explain what happened, why it&apos;s deeply problematic, and how the industry might consider responding.</itunes:summary>
      <itunes:subtitle>An enterprise SSL subscriber recently used a Temporary Restraining Order to prevent the proper revocation of misissued certificates. We explain what happened, why it&apos;s deeply problematic, and how the industry might consider responding.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>334</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1905065672</guid>
      <title>Root Causes 415: What Can I Do with These New FIPS PQC Standards?</title>
      <description><![CDATA[<p>NIST recently released PQC algorithmic standards in FIPS-203, FIPS-204, and FIPS-205 (ML-KEM, ML-DSA, and SLH-DSA). We describe what is necessary for enterprises to begin using these algorithms.</p>
]]></description>
      <pubDate>Tue, 27 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST recently released PQC algorithmic standards in FIPS-203, FIPS-204, and FIPS-205 (ML-KEM, ML-DSA, and SLH-DSA). We describe what is necessary for enterprises to begin using these algorithms.</p>
]]></content:encoded>
      <enclosure length="18786914" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fc1ef4e4-28d2-4df8-b477-421e13e44f00/audio/e4c8f94d-0556-42fe-8921-deaf5ce92370/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 415: What Can I Do with These New FIPS PQC Standards?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fc1ef4e4-28d2-4df8-b477-421e13e44f00/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:33</itunes:duration>
      <itunes:summary>NIST recently released PQC algorithmic standards in FIPS-203, FIPS-204, and FIPS-205 (ML-KEM, ML-DSA, and SLH-DSA). We describe what is necessary for enterprises to begin using these algorithms.</itunes:summary>
      <itunes:subtitle>NIST recently released PQC algorithmic standards in FIPS-203, FIPS-204, and FIPS-205 (ML-KEM, ML-DSA, and SLH-DSA). We describe what is necessary for enterprises to begin using these algorithms.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>333</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1902812710</guid>
      <title>Root Causes 414: What Are the Revocation Periods for Public Certificates?</title>
      <description><![CDATA[<p>In this episode we detail the mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.</p>
]]></description>
      <pubDate>Fri, 23 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we detail the mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.</p>
]]></content:encoded>
      <enclosure length="11493955" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/00fb88ed-37b5-4a3c-819f-b110789e072a/audio/3a8b85b5-6c38-420d-bd23-82956408bca6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 414: What Are the Revocation Periods for Public Certificates?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/00fb88ed-37b5-4a3c-819f-b110789e072a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:57</itunes:duration>
      <itunes:summary>In this episode we detail the mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.</itunes:summary>
      <itunes:subtitle>In this episode we detail the mandatory revocation periods for leaf certificates and intermediates and explain when a 24-hour versus a 120-hour revocation deadline applies.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>332</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1898656380</guid>
      <title>Root Causes 413: NIST Releases Standards for First Three PQC Algorithms</title>
      <description><![CDATA[<p>On August 13, 2024, NIST released its first three standards for PQC algorithms, ML-KEM, ML-DSA, and SLH-DSA.  We tell you where to find them and talk about what happens next.</p>
]]></description>
      <pubDate>Fri, 16 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On August 13, 2024, NIST released its first three standards for PQC algorithms, ML-KEM, ML-DSA, and SLH-DSA.  We tell you where to find them and talk about what happens next.</p>
]]></content:encoded>
      <enclosure length="6980524" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/37fa0821-f9b6-4a54-a0b1-43c655cfc91c/audio/76934ece-d8ef-4dcc-aae9-be00c84d2e4b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 413: NIST Releases Standards for First Three PQC Algorithms</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/37fa0821-f9b6-4a54-a0b1-43c655cfc91c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:15</itunes:duration>
      <itunes:summary>On August 13, 2024, NIST released its first three standards for PQC algorithms, ML-KEM, ML-DSA, and SLH-DSA.  We tell you where to find them and talk about what happens next.</itunes:summary>
      <itunes:subtitle>On August 13, 2024, NIST released its first three standards for PQC algorithms, ML-KEM, ML-DSA, and SLH-DSA.  We tell you where to find them and talk about what happens next.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>331</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1896617820</guid>
      <title>Root Causes 412: Google Throws in the Towel on Eliminating Cookies</title>
      <description><![CDATA[<p>Cookies are incredibly useful but also pose grave privacy concerns. We have in the past covered Chrome's initiatives to replace cookies.  Now Chrome has announced that for the foreseeable future cookies will remain. We explain.</p>
]]></description>
      <pubDate>Tue, 13 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Cookies are incredibly useful but also pose grave privacy concerns. We have in the past covered Chrome's initiatives to replace cookies.  Now Chrome has announced that for the foreseeable future cookies will remain. We explain.</p>
]]></content:encoded>
      <enclosure length="9516337" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5cdfb1c4-81e6-42d4-bc3e-2ffab01f82fd/audio/4f6d74a9-e35b-40ff-a1b9-28a7657fd868/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 412: Google Throws in the Towel on Eliminating Cookies</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5cdfb1c4-81e6-42d4-bc3e-2ffab01f82fd/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:54</itunes:duration>
      <itunes:summary>Cookies are incredibly useful but also pose grave privacy concerns. We have in the past covered Chrome&apos;s initiatives to replace cookies.  Now Chrome has announced that for the foreseeable future cookies will remain. We explain.</itunes:summary>
      <itunes:subtitle>Cookies are incredibly useful but also pose grave privacy concerns. We have in the past covered Chrome&apos;s initiatives to replace cookies.  Now Chrome has announced that for the foreseeable future cookies will remain. We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>330</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1893269022</guid>
      <title>Root Causes 411: PQC Security Levels</title>
      <description><![CDATA[<p>A popular belief is that Grover's algorithm will require that we double our AES key sizes.  Repeat guest Bas Westerbaan of Cloudflare explains why this myth is incorrect and talks through the concept of &quot;security levels&quot; in post-quantum cryptography.</p>
]]></description>
      <pubDate>Fri, 9 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A popular belief is that Grover's algorithm will require that we double our AES key sizes.  Repeat guest Bas Westerbaan of Cloudflare explains why this myth is incorrect and talks through the concept of &quot;security levels&quot; in post-quantum cryptography.</p>
]]></content:encoded>
      <enclosure length="19658525" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/68912cea-14b8-4700-8be8-c8e3e0585b24/audio/b1ac9156-8bb7-4746-8e33-e34d28ba2558/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 411: PQC Security Levels</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/68912cea-14b8-4700-8be8-c8e3e0585b24/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:28</itunes:duration>
      <itunes:summary>A popular belief is that Grover&apos;s algorithm will require that we double our AES key sizes.  Repeat guest Bas Westerbaan of Cloudflare explains why this myth is incorrect and talks through the concept of &quot;security levels&quot; in post-quantum cryptography.</itunes:summary>
      <itunes:subtitle>A popular belief is that Grover&apos;s algorithm will require that we double our AES key sizes.  Repeat guest Bas Westerbaan of Cloudflare explains why this myth is incorrect and talks through the concept of &quot;security levels&quot; in post-quantum cryptography.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>329</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1890673497</guid>
      <title>Root Causes 410: CrowdStrike, Automatic Updates, and Walled Gardens</title>
      <description><![CDATA[<p>We examine one specific aspect of the recent CrowdStrike flaw. Microsoft blames the problem on the fact that it must, by European law, allow kernel updates to Windows. We unpack the challenges this poses.</p>
]]></description>
      <pubDate>Tue, 6 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We examine one specific aspect of the recent CrowdStrike flaw. Microsoft blames the problem on the fact that it must, by European law, allow kernel updates to Windows. We unpack the challenges this poses.</p>
]]></content:encoded>
      <enclosure length="14863550" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/154315f9-d9b0-49f9-a869-43ae085a348e/audio/691d392c-15e9-4dd3-a41b-b9845325e021/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 410: CrowdStrike, Automatic Updates, and Walled Gardens</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/154315f9-d9b0-49f9-a869-43ae085a348e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:28</itunes:duration>
      <itunes:summary>We examine one specific aspect of the recent CrowdStrike flaw. Microsoft blames the problem on the fact that it must, by European law, allow kernel updates to Windows. We unpack the challenges this poses.</itunes:summary>
      <itunes:subtitle>We examine one specific aspect of the recent CrowdStrike flaw. Microsoft blames the problem on the fact that it must, by European law, allow kernel updates to Windows. We unpack the challenges this poses.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>328</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1887737583</guid>
      <title>Root Causes 409: Mozilla Distrusts Entrust</title>
      <description><![CDATA[<p>This week Mozilla chose to follow Chrome in deprecating the Entrust trusted roots.  We give you the details and explain why this action matters.</p>
]]></description>
      <pubDate>Fri, 2 Aug 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>This week Mozilla chose to follow Chrome in deprecating the Entrust trusted roots.  We give you the details and explain why this action matters.</p>
]]></content:encoded>
      <enclosure length="14222731" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2b68cb56-9162-465a-aebb-d533755b0ef9/audio/6ca1b190-c2f6-4bb7-960a-06ad311a9f44/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 409: Mozilla Distrusts Entrust</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2b68cb56-9162-465a-aebb-d533755b0ef9/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:48</itunes:duration>
      <itunes:summary>This week Mozilla chose to follow Chrome in deprecating the Entrust trusted roots.  We give you the details and explain why this action matters.</itunes:summary>
      <itunes:subtitle>This week Mozilla chose to follow Chrome in deprecating the Entrust trusted roots.  We give you the details and explain why this action matters.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>327</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1884629268</guid>
      <title>Root Causes 408: Takeaways from Recent Conversations with PQC Experts</title>
      <description><![CDATA[<p>In the past three months we featured far-ranging conversations about post-quantum cryptography (PQC) with experts Bas Westerbaan of Cloudflare, Dustin Moody of NIST, and Bruno Coulliard of Crypto4A.  In this episode we recap important takeaways from these conversations.</p>
]]></description>
      <pubDate>Mon, 29 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the past three months we featured far-ranging conversations about post-quantum cryptography (PQC) with experts Bas Westerbaan of Cloudflare, Dustin Moody of NIST, and Bruno Coulliard of Crypto4A.  In this episode we recap important takeaways from these conversations.</p>
]]></content:encoded>
      <enclosure length="12529423" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6f32f2b3-7fec-4821-86a8-527a2a5c3e6c/audio/949101af-4d9d-4e9e-aab7-4a32abd7303e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 408: Takeaways from Recent Conversations with PQC Experts</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6f32f2b3-7fec-4821-86a8-527a2a5c3e6c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:02</itunes:duration>
      <itunes:summary>In the past three months we featured far-ranging conversations about post-quantum cryptography (PQC) with experts Bas Westerbaan of Cloudflare, Dustin Moody of NIST, and Bruno Coulliard of Crypto4A.  In this episode we recap important takeaways from these conversations.</itunes:summary>
      <itunes:subtitle>In the past three months we featured far-ranging conversations about post-quantum cryptography (PQC) with experts Bas Westerbaan of Cloudflare, Dustin Moody of NIST, and Bruno Coulliard of Crypto4A.  In this episode we recap important takeaways from these conversations.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>326</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1881695526</guid>
      <title>Root Causes 407: Whatever Happened to Passkeys?</title>
      <description><![CDATA[<p>WebAuthn arrived last year with great fanfare.  But here we are in the latter half of 2024, and they are rarely used.  In this episode we discuss why.</p>
]]></description>
      <pubDate>Thu, 25 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>WebAuthn arrived last year with great fanfare.  But here we are in the latter half of 2024, and they are rarely used.  In this episode we discuss why.</p>
]]></content:encoded>
      <enclosure length="12897060" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/84eb5685-80de-4914-a017-2a1b6d80bbd3/audio/3257f2f3-9417-4f1a-a444-39fce6c89d23/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 407: Whatever Happened to Passkeys?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/84eb5685-80de-4914-a017-2a1b6d80bbd3/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:25</itunes:duration>
      <itunes:summary>WebAuthn arrived last year with great fanfare.  But here we are in the latter half of 2024, and they are rarely used.  In this episode we discuss why.</itunes:summary>
      <itunes:subtitle>WebAuthn arrived last year with great fanfare.  But here we are in the latter half of 2024, and they are rarely used.  In this episode we discuss why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>325</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1879320669</guid>
      <title>Root Causes 406: Certificate Discovery Is for Internal Certificates, Too</title>
      <description><![CDATA[<p>When we discuss certificate discovery in CLM platforms, there is a common assumption that we're talking about public certificates exclusively.  In this episode we explain the value of certificate discovery for internal PKI certificates also.</p>
]]></description>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>When we discuss certificate discovery in CLM platforms, there is a common assumption that we're talking about public certificates exclusively.  In this episode we explain the value of certificate discovery for internal PKI certificates also.</p>
]]></content:encoded>
      <enclosure length="17538113" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cba5bcb5-d822-4a41-acc6-85d9d10f2d35/audio/a449495f-5d53-424d-a227-79142d139383/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 406: Certificate Discovery Is for Internal Certificates, Too</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cba5bcb5-d822-4a41-acc6-85d9d10f2d35/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:15</itunes:duration>
      <itunes:summary>When we discuss certificate discovery in CLM platforms, there is a common assumption that we&apos;re talking about public certificates exclusively.  In this episode we explain the value of certificate discovery for internal PKI certificates also.</itunes:summary>
      <itunes:subtitle>When we discuss certificate discovery in CLM platforms, there is a common assumption that we&apos;re talking about public certificates exclusively.  In this episode we explain the value of certificate discovery for internal PKI certificates also.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>324</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1876016199</guid>
      <title>Root Causes 405: What Is an Adversarial Self-replicating Prompt?</title>
      <description><![CDATA[<p>In this episode we explain what an adversarial, self-replicating prompt, otherwise known as a prompt worm.</p>
]]></description>
      <pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain what an adversarial, self-replicating prompt, otherwise known as a prompt worm.</p>
]]></content:encoded>
      <enclosure length="24077017" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/79b3d469-af77-4b06-b1b3-da0f14f2fd5c/audio/e85758bc-24b0-400c-b895-16a7f8e3d0ea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 405: What Is an Adversarial Self-replicating Prompt?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/79b3d469-af77-4b06-b1b3-da0f14f2fd5c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:04</itunes:duration>
      <itunes:summary>In this episode we explain what an adversarial, self-replicating prompt, otherwise known as a prompt worm.</itunes:summary>
      <itunes:subtitle>In this episode we explain what an adversarial, self-replicating prompt, otherwise known as a prompt worm.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>323</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1873305657</guid>
      <title>Root Causes 404: SCOTUS Ruling Will Change IT Security Regulation</title>
      <description><![CDATA[<p>The US Supreme Court has struck down the Chevron Deferment, which greatly expanded federal agencies' power to interpret and enforce statutes. This monumental ruling stands to shift power considerably from agencies to courts and will put more pressure on legislatures to determine precise laws around tech.  We explore the consequences of this ruling.</p>
]]></description>
      <pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The US Supreme Court has struck down the Chevron Deferment, which greatly expanded federal agencies' power to interpret and enforce statutes. This monumental ruling stands to shift power considerably from agencies to courts and will put more pressure on legislatures to determine precise laws around tech.  We explore the consequences of this ruling.</p>
]]></content:encoded>
      <enclosure length="15453755" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b6db4d9b-149d-4de0-a544-03c304d785b1/audio/759183b5-5429-4f38-95c5-caaed54914f7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 404: SCOTUS Ruling Will Change IT Security Regulation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b6db4d9b-149d-4de0-a544-03c304d785b1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:05</itunes:duration>
      <itunes:summary>The US Supreme Court has struck down the Chevron Deferment, which greatly expanded federal agencies&apos; power to interpret and enforce statutes. This monumental ruling stands to shift power considerably from agencies to courts and will put more pressure on legislatures to determine precise laws around tech.  We explore the consequences of this ruling.</itunes:summary>
      <itunes:subtitle>The US Supreme Court has struck down the Chevron Deferment, which greatly expanded federal agencies&apos; power to interpret and enforce statutes. This monumental ruling stands to shift power considerably from agencies to courts and will put more pressure on legislatures to determine precise laws around tech.  We explore the consequences of this ruling.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>322</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1870037571</guid>
      <title>Root Causes 403: NIST PQC Contest Round 4 and Onramp with Dustin Moody</title>
      <description><![CDATA[<p>We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms.  In this episode Dustin describes going-forward efforts, including Round 4 of the NIST contest and the Onramp. We discuss some of the candidate algorithms and the consequences of having multiple algorithms available for use.</p>
]]></description>
      <pubDate>Fri, 12 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms.  In this episode Dustin describes going-forward efforts, including Round 4 of the NIST contest and the Onramp. We discuss some of the candidate algorithms and the consequences of having multiple algorithms available for use.</p>
]]></content:encoded>
      <enclosure length="20708024" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/511fe0b7-98a9-477d-b7a6-a4e76354160f/audio/87d9a260-e9b9-423a-9ae2-8651d4c2cbe2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 403: NIST PQC Contest Round 4 and Onramp with Dustin Moody</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/511fe0b7-98a9-477d-b7a6-a4e76354160f/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:33</itunes:duration>
      <itunes:summary>We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms.  In this episode Dustin describes going-forward efforts, including Round 4 of the NIST contest and the Onramp. We discuss some of the candidate algorithms and the consequences of having multiple algorithms available for use.</itunes:summary>
      <itunes:subtitle>We are joined again by Dustin Moody, who leads the NIST search for PQC algorithms.  In this episode Dustin describes going-forward efforts, including Round 4 of the NIST contest and the Onramp. We discuss some of the candidate algorithms and the consequences of having multiple algorithms available for use.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>321</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1867383906</guid>
      <title>Root Causes 402: New Social Engineering Powershell Attack</title>
      <description><![CDATA[<p>A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker. We explain and discuss potential responses.</p>
]]></description>
      <pubDate>Tue, 9 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker. We explain and discuss potential responses.</p>
]]></content:encoded>
      <enclosure length="14741428" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ac29611b-1a02-4295-8251-7c34f1863aaf/audio/94a89704-958c-4072-8501-5f248dc75969/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 402: New Social Engineering Powershell Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ac29611b-1a02-4295-8251-7c34f1863aaf/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:20</itunes:duration>
      <itunes:summary>A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker. We explain and discuss potential responses.</itunes:summary>
      <itunes:subtitle>A new social engineering exploit instructs victims to enter command line prompts to hack themselves on behalf of the hacker. We explain and discuss potential responses.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>320</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1864018266</guid>
      <title>Root Causes 401: New SSH Remote Code Execution Vulnerability Revealed</title>
      <description><![CDATA[<p>A newly revealed OpenSSH vulnerability can open enterprises to remote code execution.  We explain what is happening, why you should care, and what to do about it.</p>
]]></description>
      <pubDate>Fri, 5 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A newly revealed OpenSSH vulnerability can open enterprises to remote code execution.  We explain what is happening, why you should care, and what to do about it.</p>
]]></content:encoded>
      <enclosure length="9919935" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5b57348d-55fc-421c-93d1-5f82ca0e0325/audio/08507112-322f-47a6-9ace-3aaff3584bfd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 401: New SSH Remote Code Execution Vulnerability Revealed</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5b57348d-55fc-421c-93d1-5f82ca0e0325/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:19</itunes:duration>
      <itunes:summary>A newly revealed OpenSSH vulnerability can open enterprises to remote code execution.  We explain what is happening, why you should care, and what to do about it.</itunes:summary>
      <itunes:subtitle>A newly revealed OpenSSH vulnerability can open enterprises to remote code execution.  We explain what is happening, why you should care, and what to do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>319</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1861167417</guid>
      <title>Root Causes 400: French Court Orders DNS Poisoning</title>
      <description><![CDATA[<p>To combat piracy of sporting event transmissions, a French court has ordered major tech companies including Google and Cloudflare to poison DNS settings.  In this episode we provide some detail and generally marvel at this strange decision.</p>
]]></description>
      <pubDate>Tue, 2 Jul 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>To combat piracy of sporting event transmissions, a French court has ordered major tech companies including Google and Cloudflare to poison DNS settings.  In this episode we provide some detail and generally marvel at this strange decision.</p>
]]></content:encoded>
      <enclosure length="10202540" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a46cbf43-5265-4cc4-86c2-44e344830e7d/audio/541ee7ea-b6cd-4d63-9c2e-1150f82a3b90/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 400: French Court Orders DNS Poisoning</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a46cbf43-5265-4cc4-86c2-44e344830e7d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:37</itunes:duration>
      <itunes:summary>To combat piracy of sporting event transmissions, a French court has ordered major tech companies including Google and Cloudflare to poison DNS settings.  In this episode we provide some detail and generally marvel at this strange decision.</itunes:summary>
      <itunes:subtitle>To combat piracy of sporting event transmissions, a French court has ordered major tech companies including Google and Cloudflare to poison DNS settings.  In this episode we provide some detail and generally marvel at this strange decision.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>318</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1858655787</guid>
      <title>Root Causes 399: Entrust Distrusted</title>
      <description><![CDATA[<p>On June 27, 2024 Google Chrome announced it was distrusting Entrust as a public CA starting November 1, 2024. We explain what to expect, go over Google's stated reasons, and share some of what lead up to this.</p>
]]></description>
      <pubDate>Fri, 28 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On June 27, 2024 Google Chrome announced it was distrusting Entrust as a public CA starting November 1, 2024. We explain what to expect, go over Google's stated reasons, and share some of what lead up to this.</p>
]]></content:encoded>
      <enclosure length="18900612" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9bd5cd71-7f47-4308-8c73-7b4a819a9227/audio/85969166-5946-4e60-87f9-4dbfa220df38/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 399: Entrust Distrusted</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9bd5cd71-7f47-4308-8c73-7b4a819a9227/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:40</itunes:duration>
      <itunes:summary>On June 27, 2024 Google Chrome announced it was distrusting Entrust as a public CA starting November 1, 2024. We explain what to expect, go over Google&apos;s stated reasons, and share some of what lead up to this.</itunes:summary>
      <itunes:subtitle>On June 27, 2024 Google Chrome announced it was distrusting Entrust as a public CA starting November 1, 2024. We explain what to expect, go over Google&apos;s stated reasons, and share some of what lead up to this.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>317</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1857954651</guid>
      <title>Root Causes 398: History of the NIST PQC Contest with Dustin Moody</title>
      <description><![CDATA[<p>In this episode we are joined by Dr. Dustin Moody, leader of the NIST post-quantum cryptography contest. Dustin gives us an inside view of the background behind NIST's decision to run the contest and how we got to where we are today.</p>
]]></description>
      <pubDate>Thu, 27 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we are joined by Dr. Dustin Moody, leader of the NIST post-quantum cryptography contest. Dustin gives us an inside view of the background behind NIST's decision to run the contest and how we got to where we are today.</p>
]]></content:encoded>
      <enclosure length="24543386" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/222c5c0d-8974-46af-aa46-96c18e279eac/audio/020ab91b-fc5a-4845-ab23-f3fbf651d4d5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 398: History of the NIST PQC Contest with Dustin Moody</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/222c5c0d-8974-46af-aa46-96c18e279eac/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:33</itunes:duration>
      <itunes:summary>In this episode we are joined by Dr. Dustin Moody, leader of the NIST post-quantum cryptography contest. Dustin gives us an inside view of the background behind NIST&apos;s decision to run the contest and how we got to where we are today.</itunes:summary>
      <itunes:subtitle>In this episode we are joined by Dr. Dustin Moody, leader of the NIST post-quantum cryptography contest. Dustin gives us an inside view of the background behind NIST&apos;s decision to run the contest and how we got to where we are today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>316</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1856025987</guid>
      <title>Root Causes 397: All Post Quantum Systems Are Terrible</title>
      <description><![CDATA[<p>In this new conversation with Bas Westerbaan of Cloudflare, we reveal that all existing PQC systems present significant problems for incorporation into our existing ecosystems. We explain the problems with existing systems and some options for what to do about it.</p>
]]></description>
      <pubDate>Mon, 24 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this new conversation with Bas Westerbaan of Cloudflare, we reveal that all existing PQC systems present significant problems for incorporation into our existing ecosystems. We explain the problems with existing systems and some options for what to do about it.</p>
]]></content:encoded>
      <enclosure length="27068176" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/528d9023-701e-4591-b57a-7c9154086418/audio/45211fd9-9600-4cf6-8291-fcbc95c6fee1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 397: All Post Quantum Systems Are Terrible</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/528d9023-701e-4591-b57a-7c9154086418/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:11</itunes:duration>
      <itunes:summary>In this new conversation with Bas Westerbaan of Cloudflare, we reveal that all existing PQC systems present significant problems for incorporation into our existing ecosystems. We explain the problems with existing systems and some options for what to do about it.</itunes:summary>
      <itunes:subtitle>In this new conversation with Bas Westerbaan of Cloudflare, we reveal that all existing PQC systems present significant problems for incorporation into our existing ecosystems. We explain the problems with existing systems and some options for what to do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>315</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1853894970</guid>
      <title>Root Causes 396: The Trouble with Microsoft Recall</title>
      <description><![CDATA[<p>Microsoft has proposed a feature called Recall that uses screen images to fuel AI-assisted capabilities.  This has raised fears about the security decisions around this capability.  We talk about why and how the proposed technology has resultingly changed.</p>
]]></description>
      <pubDate>Fri, 21 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Microsoft has proposed a feature called Recall that uses screen images to fuel AI-assisted capabilities.  This has raised fears about the security decisions around this capability.  We talk about why and how the proposed technology has resultingly changed.</p>
]]></content:encoded>
      <enclosure length="13549462" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e9b3814f-f4ee-49d4-acf4-45ce351196a0/audio/15473063-e7e1-4b24-a6c3-3d516c8aa31f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 396: The Trouble with Microsoft Recall</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e9b3814f-f4ee-49d4-acf4-45ce351196a0/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:06</itunes:duration>
      <itunes:summary>Microsoft has proposed a feature called Recall that uses screen images to fuel AI-assisted capabilities.  This has raised fears about the security decisions around this capability.  We talk about why and how the proposed technology has resultingly changed.</itunes:summary>
      <itunes:subtitle>Microsoft has proposed a feature called Recall that uses screen images to fuel AI-assisted capabilities.  This has raised fears about the security decisions around this capability.  We talk about why and how the proposed technology has resultingly changed.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>314</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1851124068</guid>
      <title>Root Causes 395: Is Y2Q Like Y2K?</title>
      <description><![CDATA[<p>In this episode we compare the advent of cryptography relevancy of quantum computers (somestimes called Y2Q) to Y2K.  We uncover similarities and differences and discuss how they govern decision making between now and Y2Q.</p>
]]></description>
      <pubDate>Tue, 18 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we compare the advent of cryptography relevancy of quantum computers (somestimes called Y2Q) to Y2K.  We uncover similarities and differences and discuss how they govern decision making between now and Y2Q.</p>
]]></content:encoded>
      <enclosure length="23376136" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cbed0d52-8d79-4e34-ae2d-8243eb39fad4/audio/403191a1-183d-4b00-b143-79e44c964fd1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 395: Is Y2Q Like Y2K?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cbed0d52-8d79-4e34-ae2d-8243eb39fad4/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:20</itunes:duration>
      <itunes:summary>In this episode we compare the advent of cryptography relevancy of quantum computers (somestimes called Y2Q) to Y2K.  We uncover similarities and differences and discuss how they govern decision making between now and Y2Q.</itunes:summary>
      <itunes:subtitle>In this episode we compare the advent of cryptography relevancy of quantum computers (somestimes called Y2Q) to Y2K.  We uncover similarities and differences and discuss how they govern decision making between now and Y2Q.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>313</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1847409738</guid>
      <title>Root Causes 394: Snowflake, Ticketmaster, and MFA</title>
      <description><![CDATA[<p>In this episode we drill down on one aspect of the loss of more than 500 million Ticketmaster users' data, which is the use of MFA for access to the Snowflake platform.</p>
]]></description>
      <pubDate>Fri, 14 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we drill down on one aspect of the loss of more than 500 million Ticketmaster users' data, which is the use of MFA for access to the Snowflake platform.</p>
]]></content:encoded>
      <enclosure length="10733989" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ce0fc69-d8ae-4e67-bb5b-27c2a5328f54/audio/6873e2eb-23b9-49d3-a182-4e862b28537a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 394: Snowflake, Ticketmaster, and MFA</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ce0fc69-d8ae-4e67-bb5b-27c2a5328f54/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:10</itunes:duration>
      <itunes:summary>In this episode we drill down on one aspect of the loss of more than 500 million Ticketmaster users&apos; data, which is the use of MFA for access to the Snowflake platform.</itunes:summary>
      <itunes:subtitle>In this episode we drill down on one aspect of the loss of more than 500 million Ticketmaster users&apos; data, which is the use of MFA for access to the Snowflake platform.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>312</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1845010083</guid>
      <title>Root Causes 393: PQC-enabled Chrome Breaks Other Software</title>
      <description><![CDATA[<p>Chrome's recent 124 release supports PQC algorithms from NIST. This has led to the discovery of software and systems that break under these circumstances. We explain what happened, why, and what to do about it.</p>
]]></description>
      <pubDate>Tue, 11 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Chrome's recent 124 release supports PQC algorithms from NIST. This has led to the discovery of software and systems that break under these circumstances. We explain what happened, why, and what to do about it.</p>
]]></content:encoded>
      <enclosure length="11932082" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c9bda650-43cd-435e-a71c-8faa2e1c6d8e/audio/e9058504-69bb-4138-a143-aaaf10f16c84/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 393: PQC-enabled Chrome Breaks Other Software</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c9bda650-43cd-435e-a71c-8faa2e1c6d8e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:25</itunes:duration>
      <itunes:summary>Chrome&apos;s recent 124 release supports PQC algorithms from NIST. This has led to the discovery of software and systems that break under these circumstances. We explain what happened, why, and what to do about it.</itunes:summary>
      <itunes:subtitle>Chrome&apos;s recent 124 release supports PQC algorithms from NIST. This has led to the discovery of software and systems that break under these circumstances. We explain what happened, why, and what to do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>311</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1841274570</guid>
      <title>Root Causes 392: Chromium Issues a Quality Ultimatum</title>
      <description><![CDATA[<p>In the most recent CA/Browser Forum face-to-face meeting, the Google Chrome root program gave a presentation clearly defining its expectations for quality of incident reporting from CAs with an eye to where many CAs have been failing.  We relate Chromium's statements and their significance.</p>
]]></description>
      <pubDate>Fri, 7 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the most recent CA/Browser Forum face-to-face meeting, the Google Chrome root program gave a presentation clearly defining its expectations for quality of incident reporting from CAs with an eye to where many CAs have been failing.  We relate Chromium's statements and their significance.</p>
]]></content:encoded>
      <enclosure length="20439982" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2aa1d488-b897-4732-b8a5-f004341046b4/audio/7fde7fa2-0fb0-435a-bbbf-978abf613e94/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 392: Chromium Issues a Quality Ultimatum</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2aa1d488-b897-4732-b8a5-f004341046b4/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:17</itunes:duration>
      <itunes:summary>In the most recent CA/Browser Forum face-to-face meeting, the Google Chrome root program gave a presentation clearly defining its expectations for quality of incident reporting from CAs with an eye to where many CAs have been failing.  We relate Chromium&apos;s statements and their significance.</itunes:summary>
      <itunes:subtitle>In the most recent CA/Browser Forum face-to-face meeting, the Google Chrome root program gave a presentation clearly defining its expectations for quality of incident reporting from CAs with an eye to where many CAs have been failing.  We relate Chromium&apos;s statements and their significance.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>310</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1837730097</guid>
      <title>Root Causes 391: 20 Percent of Web Visits Are PQC Enabled Today</title>
      <description><![CDATA[<p>Cloudflare research engineer Bas Westerbaan joins us to share his observations about post-quantum cryptography and what it does in the real world. We talk about the pragmatic needs of moving the internet for PQC and speculate about timelines for availability of PQC certificates.</p>
]]></description>
      <pubDate>Tue, 4 Jun 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Cloudflare research engineer Bas Westerbaan joins us to share his observations about post-quantum cryptography and what it does in the real world. We talk about the pragmatic needs of moving the internet for PQC and speculate about timelines for availability of PQC certificates.</p>
]]></content:encoded>
      <enclosure length="21608488" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/08936a50-5d56-4fe9-9a72-c94127bc5483/audio/95ab0b1a-1216-4d30-9e51-9c4f7d1828b1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 391: 20 Percent of Web Visits Are PQC Enabled Today</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/08936a50-5d56-4fe9-9a72-c94127bc5483/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:29</itunes:duration>
      <itunes:summary>Cloudflare research engineer Bas Westerbaan joins us to share his observations about post-quantum cryptography and what it does in the real world. We talk about the pragmatic needs of moving the internet for PQC and speculate about timelines for availability of PQC certificates.</itunes:summary>
      <itunes:subtitle>Cloudflare research engineer Bas Westerbaan joins us to share his observations about post-quantum cryptography and what it does in the real world. We talk about the pragmatic needs of moving the internet for PQC and speculate about timelines for availability of PQC certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>309</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1834714758</guid>
      <title>Root Causes 390: Chromium Boosts Its Distrust Agility with a New Root Trust Deprecation</title>
      <description><![CDATA[<p>A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.  We explain the significant of this event.</p>
]]></description>
      <pubDate>Fri, 31 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.  We explain the significant of this event.</p>
]]></content:encoded>
      <enclosure length="21024792" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bc2116c5-ca4f-4b45-9fec-a40d26c47fa3/audio/75da57e3-e10f-4bbb-94f2-0a137e4d604c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 390: Chromium Boosts Its Distrust Agility with a New Root Trust Deprecation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bc2116c5-ca4f-4b45-9fec-a40d26c47fa3/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:53</itunes:duration>
      <itunes:summary>A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.  We explain the significant of this event.</itunes:summary>
      <itunes:subtitle>A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.  We explain the significant of this event.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>308</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1832334870</guid>
      <title>Root Causes 389: 2024 RSA Conference Wrap Up</title>
      <description><![CDATA[<p>Jason and I do our annual RSA wrap-up.  Trending segments include AI, Trust Centers, MFA, PQC, and more.</p>
]]></description>
      <pubDate>Tue, 28 May 2024 19:00:40 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason and I do our annual RSA wrap-up.  Trending segments include AI, Trust Centers, MFA, PQC, and more.</p>
]]></content:encoded>
      <enclosure length="26298027" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/46973de9-7424-4aee-8bc8-b1542ef7f558/audio/69ff1a9b-3607-4d99-abbd-58d7777bde8e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 389: 2024 RSA Conference Wrap Up</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/46973de9-7424-4aee-8bc8-b1542ef7f558/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:23</itunes:duration>
      <itunes:summary>Jason and I do our annual RSA wrap-up.  Trending segments include AI, Trust Centers, MFA, PQC, and more.</itunes:summary>
      <itunes:subtitle>Jason and I do our annual RSA wrap-up.  Trending segments include AI, Trust Centers, MFA, PQC, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>307</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1827626145</guid>
      <title>Root Causes 388: What Is the WebPKI?</title>
      <description><![CDATA[<p>These days we frequently discuss &quot;the WebPKI.&quot; But what does that really mean?  In this episode we define the term and explain how this definition evolved over time. We give an inventory of a main components of the WebPKI and discuss what's required to become a CA.</p>
]]></description>
      <pubDate>Wed, 22 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>These days we frequently discuss &quot;the WebPKI.&quot; But what does that really mean?  In this episode we define the term and explain how this definition evolved over time. We give an inventory of a main components of the WebPKI and discuss what's required to become a CA.</p>
]]></content:encoded>
      <enclosure length="25192732" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3abecc35-b98e-47e0-8f18-4dd81d95619b/audio/a3fb2285-aedf-407f-a1df-277093791ea4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 388: What Is the WebPKI?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3abecc35-b98e-47e0-8f18-4dd81d95619b/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:14</itunes:duration>
      <itunes:summary>These days we frequently discuss &quot;the WebPKI.&quot; But what does that really mean?  In this episode we define the term and explain how this definition evolved over time. We give an inventory of a main components of the WebPKI and discuss what&apos;s required to become a CA.</itunes:summary>
      <itunes:subtitle>These days we frequently discuss &quot;the WebPKI.&quot; But what does that really mean?  In this episode we define the term and explain how this definition evolved over time. We give an inventory of a main components of the WebPKI and discuss what&apos;s required to become a CA.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>306</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1823735208</guid>
      <title>Root Causes 387:  What Is the Post-quantum Readiness of HSMs?</title>
      <description><![CDATA[<p>We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).</p>
]]></description>
      <pubDate>Thu, 16 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).</p>
]]></content:encoded>
      <enclosure length="30308346" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7607d9cc-8ffa-4b8b-b82f-24dccc0229b1/audio/0b27e876-7c64-4a60-8ed9-f8042cc1c717/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 387:  What Is the Post-quantum Readiness of HSMs?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7607d9cc-8ffa-4b8b-b82f-24dccc0229b1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:33</itunes:duration>
      <itunes:summary>We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).</itunes:summary>
      <itunes:subtitle>We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>305</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1820978577</guid>
      <title>Root Causes 386: Meta Commits MITM Attack On Its Users</title>
      <description><![CDATA[<p>Recent court documents reveal that in 2016 Meta (then Facebook) set up a system to get around encryption and spy on traffic between its users and competing social media platforms.  We explain what happened.</p>
]]></description>
      <pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent court documents reveal that in 2016 Meta (then Facebook) set up a system to get around encryption and spy on traffic between its users and competing social media platforms.  We explain what happened.</p>
]]></content:encoded>
      <enclosure length="13817520" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b0d6c4cb-2384-4815-ad19-5950bba39ba1/audio/06752a6c-8c7b-4633-9f00-d7a0d23895dc/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 386: Meta Commits MITM Attack On Its Users</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b0d6c4cb-2384-4815-ad19-5950bba39ba1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:23</itunes:duration>
      <itunes:summary>Recent court documents reveal that in 2016 Meta (then Facebook) set up a system to get around encryption and spy on traffic between its users and competing social media platforms.  We explain what happened.</itunes:summary>
      <itunes:subtitle>Recent court documents reveal that in 2016 Meta (then Facebook) set up a system to get around encryption and spy on traffic between its users and competing social media platforms.  We explain what happened.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>304</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1819066581</guid>
      <title>Root Causes 385: Failed Revocation and Wildcard Certificates</title>
      <description><![CDATA[<p>We discuss misuse of wildcard certificates, failure to revoke on time, and how these two failures magnify each other.</p>
]]></description>
      <pubDate>Fri, 10 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss misuse of wildcard certificates, failure to revoke on time, and how these two failures magnify each other.</p>
]]></content:encoded>
      <enclosure length="11832245" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bdf293d1-c851-46f5-9261-67d55d687adf/audio/9ef62bce-bc65-4814-ace8-1e3e4017c686/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 385: Failed Revocation and Wildcard Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bdf293d1-c851-46f5-9261-67d55d687adf/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:19</itunes:duration>
      <itunes:summary>We discuss misuse of wildcard certificates, failure to revoke on time, and how these two failures magnify each other.</itunes:summary>
      <itunes:subtitle>We discuss misuse of wildcard certificates, failure to revoke on time, and how these two failures magnify each other.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>303</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1816236660</guid>
      <title>Root Causes 384: So What Is a Senior Fellow Anyway?</title>
      <description><![CDATA[<p>Jason has a new title, Senior Fellow. In this episode Jason explains what his new focus will be and how this will be good for Root Causes.</p>
]]></description>
      <pubDate>Tue, 7 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Jason has a new title, Senior Fellow. In this episode Jason explains what his new focus will be and how this will be good for Root Causes.</p>
]]></content:encoded>
      <enclosure length="7092139" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5c7eb24d-0c6d-4c30-b647-1e1377260414/audio/fc4cbf4c-fc93-4b40-b9d8-883de2dc251a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 384: So What Is a Senior Fellow Anyway?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5c7eb24d-0c6d-4c30-b647-1e1377260414/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:22</itunes:duration>
      <itunes:summary>Jason has a new title, Senior Fellow. In this episode Jason explains what his new focus will be and how this will be good for Root Causes.</itunes:summary>
      <itunes:subtitle>Jason has a new title, Senior Fellow. In this episode Jason explains what his new focus will be and how this will be good for Root Causes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>302</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1812635115</guid>
      <title>Root Causes 383: Delayed Revocation Events by the Numbers</title>
      <description><![CDATA[<p>An epidemic of delayed revocations has infected the public CA community. We track delayed revocations since the beginning of 2021, examine the trend line, and discuss root causes.</p>
]]></description>
      <pubDate>Thu, 2 May 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>An epidemic of delayed revocations has infected the public CA community. We track delayed revocations since the beginning of 2021, examine the trend line, and discuss root causes.</p>
]]></content:encoded>
      <enclosure length="24458166" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d38001fc-375c-4003-bf0a-c3eb55a466ee/audio/bc163308-1d33-4e84-ad6a-af7b769bd71d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 383: Delayed Revocation Events by the Numbers</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d38001fc-375c-4003-bf0a-c3eb55a466ee/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:28</itunes:duration>
      <itunes:summary>An epidemic of delayed revocations has infected the public CA community. We track delayed revocations since the beginning of 2021, examine the trend line, and discuss root causes.</itunes:summary>
      <itunes:subtitle>An epidemic of delayed revocations has infected the public CA community. We track delayed revocations since the beginning of 2021, examine the trend line, and discuss root causes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>301</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1810508940</guid>
      <title>Root Causes 382: Mobile Phone Malware Steals Faces for Access</title>
      <description><![CDATA[<p>New malware photographs users' faces to defeat authentication mechanisms. We explain the that biometrics are not &quot;secrets&quot; and discuss the continuing progression of attacks to steal biometrics.</p>
]]></description>
      <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>New malware photographs users' faces to defeat authentication mechanisms. We explain the that biometrics are not &quot;secrets&quot; and discuss the continuing progression of attacks to steal biometrics.</p>
]]></content:encoded>
      <enclosure length="11242432" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f0a78b93-0fdd-44bc-87a2-fb038a2bef71/audio/8430f470-c189-4b58-ac5e-49fbd0e6aad4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 382: Mobile Phone Malware Steals Faces for Access</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f0a78b93-0fdd-44bc-87a2-fb038a2bef71/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:42</itunes:duration>
      <itunes:summary>New malware photographs users&apos; faces to defeat authentication mechanisms. We explain the that biometrics are not &quot;secrets&quot; and discuss the continuing progression of attacks to steal biometrics.</itunes:summary>
      <itunes:subtitle>New malware photographs users&apos; faces to defeat authentication mechanisms. We explain the that biometrics are not &quot;secrets&quot; and discuss the continuing progression of attacks to steal biometrics.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>300</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1808605410</guid>
      <title>Root Causes 381: Apple Chip Sideloading Attack Leaks Encryption Keys</title>
      <description><![CDATA[<p>A newly revealed side channel attack enables theft of private keys from M-series Apple chips.  We explain.</p>
]]></description>
      <pubDate>Fri, 26 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A newly revealed side channel attack enables theft of private keys from M-series Apple chips.  We explain.</p>
]]></content:encoded>
      <enclosure length="7223102" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ff9b1fb3-e18a-4f82-8c8d-beff2c5f4818/audio/4c0423f6-e156-487f-86b6-b2a09c73cae9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 381: Apple Chip Sideloading Attack Leaks Encryption Keys</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ff9b1fb3-e18a-4f82-8c8d-beff2c5f4818/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:30</itunes:duration>
      <itunes:summary>A newly revealed side channel attack enables theft of private keys from M-series Apple chips.  We explain.</itunes:summary>
      <itunes:subtitle>A newly revealed side channel attack enables theft of private keys from M-series Apple chips.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>299</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1806091554</guid>
      <title>Root Causes 380: What If Quantum Supremacy Comes Earlier Than We Thought?</title>
      <description><![CDATA[<p>Repeat guest Bruno Coulliard gives us an update on the US government's migration to post-quantum cryptography (PQC). We talk about the challenges to migration, the possibility of a black swan event in achieving quantum supremacy, and what happens if we all respond by pressing the &quot;panic button&quot; at the same time.</p>
]]></description>
      <pubDate>Mon, 22 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Bruno Coulliard gives us an update on the US government's migration to post-quantum cryptography (PQC). We talk about the challenges to migration, the possibility of a black swan event in achieving quantum supremacy, and what happens if we all respond by pressing the &quot;panic button&quot; at the same time.</p>
]]></content:encoded>
      <enclosure length="28347642" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7d9787e3-5646-4059-8c55-2904b7dc1736/audio/5d70b86c-7a25-4b44-a6ee-829356a9064a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 380: What If Quantum Supremacy Comes Earlier Than We Thought?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7d9787e3-5646-4059-8c55-2904b7dc1736/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:31</itunes:duration>
      <itunes:summary>Repeat guest Bruno Coulliard gives us an update on the US government&apos;s migration to post-quantum cryptography (PQC). We talk about the challenges to migration, the possibility of a black swan event in achieving quantum supremacy, and what happens if we all respond by pressing the &quot;panic button&quot; at the same time.</itunes:summary>
      <itunes:subtitle>Repeat guest Bruno Coulliard gives us an update on the US government&apos;s migration to post-quantum cryptography (PQC). We talk about the challenges to migration, the possibility of a black swan event in achieving quantum supremacy, and what happens if we all respond by pressing the &quot;panic button&quot; at the same time.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>298</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1803042201</guid>
      <title>Root Causes 379: AI-generated Fake IDS for KYC</title>
      <description><![CDATA[<p>Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available online. These pose a problem for KYC initiatives.</p>
]]></description>
      <pubDate>Thu, 18 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available online. These pose a problem for KYC initiatives.</p>
]]></content:encoded>
      <enclosure length="12942866" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4dd936de-b233-4472-a56d-78c785da99ec/audio/245f0f39-8b67-4e71-85f3-c9b694e528e1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 379: AI-generated Fake IDS for KYC</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4dd936de-b233-4472-a56d-78c785da99ec/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:28</itunes:duration>
      <itunes:summary>Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available online. These pose a problem for KYC initiatives.</itunes:summary>
      <itunes:subtitle>Inexpensive and easily obtained deepfake photographs of IDs, generated by AI, are available online. These pose a problem for KYC initiatives.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>297</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1801269930</guid>
      <title>Root Causes 378: Why Are Forced Revocations So Difficult?</title>
      <description><![CDATA[<p>In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into the problem of failure to revoke on time and the multiple causes that lead to this ongoing failure. And what to do about them.</p>
]]></description>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into the problem of failure to revoke on time and the multiple causes that lead to this ongoing failure. And what to do about them.</p>
]]></content:encoded>
      <enclosure length="20294450" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7e6a9681-8ee3-4e76-8766-f8921a04c16d/audio/860fc83e-84ae-4195-9caa-568d37107640/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 378: Why Are Forced Revocations So Difficult?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7e6a9681-8ee3-4e76-8766-f8921a04c16d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:07</itunes:duration>
      <itunes:summary>In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into the problem of failure to revoke on time and the multiple causes that lead to this ongoing failure. And what to do about them.</itunes:summary>
      <itunes:subtitle>In the latest in our ongoing series of discussions of the Bugzilla Bloodbath, we delve deep into the problem of failure to revoke on time and the multiple causes that lead to this ongoing failure. And what to do about them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>296</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1798606657</guid>
      <title>Root Causes 377: Is CPS/Issuance Misalignment a Revocation Event?</title>
      <description><![CDATA[<p>If you issue public certificates that are fully compliant except that they do not reflect what your CPS says, are they misissued? Do they require revocation? This is a question with real stakes as we see multiple current instances of a CA denying revocation for that reason. In this episode we explore this issue.</p>
]]></description>
      <pubDate>Thu, 11 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>If you issue public certificates that are fully compliant except that they do not reflect what your CPS says, are they misissued? Do they require revocation? This is a question with real stakes as we see multiple current instances of a CA denying revocation for that reason. In this episode we explore this issue.</p>
]]></content:encoded>
      <enclosure length="16429613" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e2fa6712-c51d-4e00-aee2-47b1ab7d1d22/audio/40ad79b9-8862-4de9-a41f-6b0a270bfe1c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 377: Is CPS/Issuance Misalignment a Revocation Event?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e2fa6712-c51d-4e00-aee2-47b1ab7d1d22/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:06</itunes:duration>
      <itunes:summary>If you issue public certificates that are fully compliant except that they do not reflect what your CPS says, are they misissued? Do they require revocation? This is a question with real stakes as we see multiple current instances of a CA denying revocation for that reason. In this episode we explore this issue.</itunes:summary>
      <itunes:subtitle>If you issue public certificates that are fully compliant except that they do not reflect what your CPS says, are they misissued? Do they require revocation? This is a question with real stakes as we see multiple current instances of a CA denying revocation for that reason. In this episode we explore this issue.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>295</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1796481337</guid>
      <title>Root Causes 376: Gartner&apos;s New CLM Framework</title>
      <description><![CDATA[<p>Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core Functions of Certificate Automation. We walk through this framework and answer how it fits in with our own Five Pillars of CLM.</p>
]]></description>
      <pubDate>Mon, 8 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core Functions of Certificate Automation. We walk through this framework and answer how it fits in with our own Five Pillars of CLM.</p>
]]></content:encoded>
      <enclosure length="18720804" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/56b4fa29-2b34-4b35-bf97-cfd2d0533601/audio/e7b6d060-c872-4ead-9819-5a16f11d4430/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 376: Gartner&apos;s New CLM Framework</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/56b4fa29-2b34-4b35-bf97-cfd2d0533601/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:29</itunes:duration>
      <itunes:summary>Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core Functions of Certificate Automation. We walk through this framework and answer how it fits in with our own Five Pillars of CLM.</itunes:summary>
      <itunes:subtitle>Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core Functions of Certificate Automation. We walk through this framework and answer how it fits in with our own Five Pillars of CLM.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>294</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1793965165</guid>
      <title>Root Causes 375: What Is Name Space Lifecycle Management?</title>
      <description><![CDATA[<p>In this guest episode we discuss name space hygiene with Geir Rasmussen, founder of NodeZro. CNAMEs, SPF, DMARC, name server entries, and other DNS identifiers, left unattended, can expose companies to identity-based attacks. We lay out the steps in addressing name space cleanup.</p>
]]></description>
      <pubDate>Fri, 5 Apr 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this guest episode we discuss name space hygiene with Geir Rasmussen, founder of NodeZro. CNAMEs, SPF, DMARC, name server entries, and other DNS identifiers, left unattended, can expose companies to identity-based attacks. We lay out the steps in addressing name space cleanup.</p>
]]></content:encoded>
      <enclosure length="26877721" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f1ba81e8-c0b3-4986-a63e-cf1b592c8d50/audio/a1e07a17-b4d6-409c-b11f-cc2b6bf238bd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 375: What Is Name Space Lifecycle Management?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f1ba81e8-c0b3-4986-a63e-cf1b592c8d50/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:59</itunes:duration>
      <itunes:summary>In this guest episode we discuss name space hygiene with Geir Rasmussen, founder of NodeZro. CNAMEs, SPF, DMARC, name server entries, and other DNS identifiers, left unattended, can expose companies to identity-based attacks. We lay out the steps in addressing name space cleanup.</itunes:summary>
      <itunes:subtitle>In this guest episode we discuss name space hygiene with Geir Rasmussen, founder of NodeZro. CNAMEs, SPF, DMARC, name server entries, and other DNS identifiers, left unattended, can expose companies to identity-based attacks. We lay out the steps in addressing name space cleanup.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>293</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1789831396</guid>
      <title>Root Causes 374: NIST Cyber Security Framework 2 Released</title>
      <description><![CDATA[<p>NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity management and authentication. In this first episode of a series, we describe this framework's basic structure and its effect on industry.</p>
]]></description>
      <pubDate>Sun, 31 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity management and authentication. In this first episode of a series, we describe this framework's basic structure and its effect on industry.</p>
]]></content:encoded>
      <enclosure length="13959603" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/07ca3a7e-1598-43be-af24-be589a857280/audio/905b2597-c62a-4650-89c6-6aad004d4133/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 374: NIST Cyber Security Framework 2 Released</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/07ca3a7e-1598-43be-af24-be589a857280/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:31</itunes:duration>
      <itunes:summary>NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity management and authentication. In this first episode of a series, we describe this framework&apos;s basic structure and its effect on industry.</itunes:summary>
      <itunes:subtitle>NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity management and authentication. In this first episode of a series, we describe this framework&apos;s basic structure and its effect on industry.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>292</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1787710111</guid>
      <title>Root Causes 373: Massive Brand Hijack Subverts More Than 21,000 Domains and Subdomains</title>
      <description><![CDATA[<p>A massive name space attack has hijacked more than 21,000 domains and subdomains, including a who's who list of major global brands. This huge and innovative attack takes advantage of inherited trust in abandoned domains.  We explain what is happening.</p>
]]></description>
      <pubDate>Fri, 29 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A massive name space attack has hijacked more than 21,000 domains and subdomains, including a who's who list of major global brands. This huge and innovative attack takes advantage of inherited trust in abandoned domains.  We explain what is happening.</p>
]]></content:encoded>
      <enclosure length="14101712" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0d390c0a-2776-4310-9815-27475520a76b/audio/e23dc72c-c4d4-4d71-bcfb-33160d9767e6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 373: Massive Brand Hijack Subverts More Than 21,000 Domains and Subdomains</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0d390c0a-2776-4310-9815-27475520a76b/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:40</itunes:duration>
      <itunes:summary>A massive name space attack has hijacked more than 21,000 domains and subdomains, including a who&apos;s who list of major global brands. This huge and innovative attack takes advantage of inherited trust in abandoned domains.  We explain what is happening.</itunes:summary>
      <itunes:subtitle>A massive name space attack has hijacked more than 21,000 domains and subdomains, including a who&apos;s who list of major global brands. This huge and innovative attack takes advantage of inherited trust in abandoned domains.  We explain what is happening.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>291</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1784895846</guid>
      <title>Root Causes 372: Bugzilla Bloodbath</title>
      <description><![CDATA[<p>It's a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up, which is 10x the typical pace. And it's not over. In this episode we explain what is going on and why.</p>
]]></description>
      <pubDate>Tue, 26 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>It's a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up, which is 10x the typical pace. And it's not over. In this episode we explain what is going on and why.</p>
]]></content:encoded>
      <enclosure length="21209889" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ed79529b-ce16-4a2c-8929-88073792eb5a/audio/16f897a7-4fcf-4ffd-92f4-3fbc5a2d4d52/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 372: Bugzilla Bloodbath</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ed79529b-ce16-4a2c-8929-88073792eb5a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:05</itunes:duration>
      <itunes:summary>It&apos;s a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up, which is 10x the typical pace. And it&apos;s not over. In this episode we explain what is going on and why.</itunes:summary>
      <itunes:subtitle>It&apos;s a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up, which is 10x the typical pace. And it&apos;s not over. In this episode we explain what is going on and why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>290</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1781920632</guid>
      <title>Root Causes 371: MPIC Rules Go to CABF Ballot</title>
      <description><![CDATA[<p>A ballot for Multi-perspective Issuance Corroboration (MPIC), formerly known as MPDV, has entered a discussion period in the CA/Browser Forum (CABF).  We explain the details of what it contains.</p>
]]></description>
      <pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A ballot for Multi-perspective Issuance Corroboration (MPIC), formerly known as MPDV, has entered a discussion period in the CA/Browser Forum (CABF).  We explain the details of what it contains.</p>
]]></content:encoded>
      <enclosure length="19487016" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/101d6cc5-ac7d-4202-a5b6-e1db18b0682c/audio/13aa7f21-9c44-46a3-bb69-9b859e65095f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 371: MPIC Rules Go to CABF Ballot</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/101d6cc5-ac7d-4202-a5b6-e1db18b0682c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:17</itunes:duration>
      <itunes:summary>A ballot for Multi-perspective Issuance Corroboration (MPIC), formerly known as MPDV, has entered a discussion period in the CA/Browser Forum (CABF).  We explain the details of what it contains.</itunes:summary>
      <itunes:subtitle>A ballot for Multi-perspective Issuance Corroboration (MPIC), formerly known as MPDV, has entered a discussion period in the CA/Browser Forum (CABF).  We explain the details of what it contains.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>289</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1779339657</guid>
      <title>Root Causes 370: Drama on Bugzilla</title>
      <description><![CDATA[<p>An evolving incident on Bugzilla has garnered a lot of attention and touches several important issues in the WebPKI ecosystem. We report what went on and unpack the issues involved.</p>
]]></description>
      <pubDate>Tue, 19 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>An evolving incident on Bugzilla has garnered a lot of attention and touches several important issues in the WebPKI ecosystem. We report what went on and unpack the issues involved.</p>
]]></content:encoded>
      <enclosure length="26542958" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a5306c5f-8533-4c64-aae2-35363ef52277/audio/f3c5a545-9018-4e70-bbdc-3f3f00fc8ba1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 370: Drama on Bugzilla</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a5306c5f-8533-4c64-aae2-35363ef52277/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:38</itunes:duration>
      <itunes:summary>An evolving incident on Bugzilla has garnered a lot of attention and touches several important issues in the WebPKI ecosystem. We report what went on and unpack the issues involved.</itunes:summary>
      <itunes:subtitle>An evolving incident on Bugzilla has garnered a lot of attention and touches several important issues in the WebPKI ecosystem. We report what went on and unpack the issues involved.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>288</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1775447613</guid>
      <title>Root Causes 369: iMessage to Be PQC Enabled</title>
      <description><![CDATA[<p>Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.</p>
]]></description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.</p>
]]></content:encoded>
      <enclosure length="14192677" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/eca9c518-0b3c-4fb8-9fb9-cf30d21a7d83/audio/d20d947a-5493-4283-b7aa-6fdc55b0692a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 369: iMessage to Be PQC Enabled</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/eca9c518-0b3c-4fb8-9fb9-cf30d21a7d83/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:46</itunes:duration>
      <itunes:summary>Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.</itunes:summary>
      <itunes:subtitle>Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>287</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1773561219</guid>
      <title>Root Causes 368: CRYSTALS-Kyber Is Now ML-KEM</title>
      <description><![CDATA[<p>What has been known as CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the state of the NIST round 3 winners.</p>
]]></description>
      <pubDate>Wed, 13 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>What has been known as CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the state of the NIST round 3 winners.</p>
]]></content:encoded>
      <enclosure length="8772903" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/65800afb-834a-42c3-ab2f-b1998b1156f3/audio/fbd15af1-4643-4764-966e-bf8387859984/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 368: CRYSTALS-Kyber Is Now ML-KEM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/65800afb-834a-42c3-ab2f-b1998b1156f3/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:07</itunes:duration>
      <itunes:summary>What has been known as CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the state of the NIST round 3 winners.</itunes:summary>
      <itunes:subtitle>What has been known as CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the state of the NIST round 3 winners.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>286</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1767953646</guid>
      <title>Root Causes 367: Did an IoT Toothbrush Botnet Perform DDoS Attacks?</title>
      <description><![CDATA[<p>A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.</p>
]]></description>
      <pubDate>Thu, 7 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.</p>
]]></content:encoded>
      <enclosure length="7253045" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0eabf638-6db7-4efe-88b2-e1ecac72fd4c/audio/ab582d34-81f1-40d8-a1cc-0bfae35a0f37/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 367: Did an IoT Toothbrush Botnet Perform DDoS Attacks?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0eabf638-6db7-4efe-88b2-e1ecac72fd4c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:32</itunes:duration>
      <itunes:summary>A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.</itunes:summary>
      <itunes:subtitle>A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>285</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1765059684</guid>
      <title>Root Causes 366: What Is eIDAS?</title>
      <description><![CDATA[<p>eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem.  But what is eIDAS?  What does it do, and why does it exist?  In this episode we give you the basics.</p>
]]></description>
      <pubDate>Mon, 4 Mar 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem.  But what is eIDAS?  What does it do, and why does it exist?  In this episode we give you the basics.</p>
]]></content:encoded>
      <enclosure length="26151192" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5f694e32-de8e-4fb0-ae7b-c86288ebb07a/audio/3a38fb9d-148b-47ae-a2b7-ea3fc008f42b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 366: What Is eIDAS?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5f694e32-de8e-4fb0-ae7b-c86288ebb07a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:13</itunes:duration>
      <itunes:summary>eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem.  But what is eIDAS?  What does it do, and why does it exist?  In this episode we give you the basics.</itunes:summary>
      <itunes:subtitle>eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem.  But what is eIDAS?  What does it do, and why does it exist?  In this episode we give you the basics.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>284</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1758017310</guid>
      <title>Root Causes 365: What Is Subdomain Hijacking?</title>
      <description><![CDATA[<p>In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.</p>
]]></description>
      <pubDate>Mon, 26 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.</p>
]]></content:encoded>
      <enclosure length="12993446" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/56a9645e-7cf4-47f8-b54a-5aa93c0c9ee1/audio/dab4ba09-c3c4-4093-9b0f-f205bd89d2a1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 365: What Is Subdomain Hijacking?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/56a9645e-7cf4-47f8-b54a-5aa93c0c9ee1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:31</itunes:duration>
      <itunes:summary>In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.</itunes:summary>
      <itunes:subtitle>In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>283</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1754915097</guid>
      <title>Root Causes 364: Video Conference Deepfake Enables $25 Million Theft</title>
      <description><![CDATA[<p>Deepfakes continue to show themselves as part of the standard criminal toolkit. A recent deepfake spear phish enabled a $25 million Business Email Compromise (BEC).  We explain what happened.</p>
]]></description>
      <pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Deepfakes continue to show themselves as part of the standard criminal toolkit. A recent deepfake spear phish enabled a $25 million Business Email Compromise (BEC).  We explain what happened.</p>
]]></content:encoded>
      <enclosure length="8378935" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f0e5f68d-5464-408c-aeef-13206897b038/audio/8037b4c1-f775-47d8-b72d-99c077e8c059/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 364: Video Conference Deepfake Enables $25 Million Theft</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f0e5f68d-5464-408c-aeef-13206897b038/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:43</itunes:duration>
      <itunes:summary>Deepfakes continue to show themselves as part of the standard criminal toolkit. A recent deepfake spear phish enabled a $25 million Business Email Compromise (BEC).  We explain what happened.</itunes:summary>
      <itunes:subtitle>Deepfakes continue to show themselves as part of the standard criminal toolkit. A recent deepfake spear phish enabled a $25 million Business Email Compromise (BEC).  We explain what happened.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>282</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1751933661</guid>
      <title>Root Causes 363: Defending Yourself Against Use of Stolen Privileges</title>
      <description><![CDATA[<p>CloudFlare recently published details of an attack it suffered as a downstream effect of a November 2023 breach against Okta and what it did to nullify its success. We discuss the steps enterprises can take to protect themselves against malicious use of stolen access credentials.</p>
]]></description>
      <pubDate>Sun, 18 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>CloudFlare recently published details of an attack it suffered as a downstream effect of a November 2023 breach against Okta and what it did to nullify its success. We discuss the steps enterprises can take to protect themselves against malicious use of stolen access credentials.</p>
]]></content:encoded>
      <enclosure length="7352882" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0214d1e6-d2cc-4d6b-b772-bb226641ab8a/audio/2ceb5077-c724-48ce-a099-94eff95e3d96/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 363: Defending Yourself Against Use of Stolen Privileges</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0214d1e6-d2cc-4d6b-b772-bb226641ab8a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:39</itunes:duration>
      <itunes:summary>CloudFlare recently published details of an attack it suffered as a downstream effect of a November 2023 breach against Okta and what it did to nullify its success. We discuss the steps enterprises can take to protect themselves against malicious use of stolen access credentials.</itunes:summary>
      <itunes:subtitle>CloudFlare recently published details of an attack it suffered as a downstream effect of a November 2023 breach against Okta and what it did to nullify its success. We discuss the steps enterprises can take to protect themselves against malicious use of stolen access credentials.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>281</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1746191091</guid>
      <title>Root Causes 362:  When You&apos;re Attacked by a State Actor</title>
      <description><![CDATA[<p>In this episode we share the details of a recent nation state actor attack on Microsoft and some of the lessons learned.</p>
]]></description>
      <pubDate>Mon, 12 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we share the details of a recent nation state actor attack on Microsoft and some of the lessons learned.</p>
]]></content:encoded>
      <enclosure length="9714100" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fa9bd4ae-b94b-4771-a33b-b186f0e1144c/audio/70acc18c-633c-45d7-a35c-5958b91395ce/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 362:  When You&apos;re Attacked by a State Actor</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fa9bd4ae-b94b-4771-a33b-b186f0e1144c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:06</itunes:duration>
      <itunes:summary>In this episode we share the details of a recent nation state actor attack on Microsoft and some of the lessons learned.</itunes:summary>
      <itunes:subtitle>In this episode we share the details of a recent nation state actor attack on Microsoft and some of the lessons learned.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>280</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1742379576</guid>
      <title>Root Causes 361: The Premise of on Premise</title>
      <description><![CDATA[<p>In this episode we examine commonly held belief that on-premise systems give system administrators greater levels of control and that that is better for security or other reasons. We explore the pros and cons of extra control, to what degree it is a benefit, and if it's worth it.</p>
]]></description>
      <pubDate>Fri, 9 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we examine commonly held belief that on-premise systems give system administrators greater levels of control and that that is better for security or other reasons. We explore the pros and cons of extra control, to what degree it is a benefit, and if it's worth it.</p>
]]></content:encoded>
      <enclosure length="35548174" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0e19ff53-2d6d-42da-94a2-cd2cb9c5ad60/audio/c0cc43bf-d39e-4669-a3d4-b89ee37976b2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 361: The Premise of on Premise</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0e19ff53-2d6d-42da-94a2-cd2cb9c5ad60/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:01</itunes:duration>
      <itunes:summary>In this episode we examine commonly held belief that on-premise systems give system administrators greater levels of control and that that is better for security or other reasons. We explore the pros and cons of extra control, to what degree it is a benefit, and if it&apos;s worth it.</itunes:summary>
      <itunes:subtitle>In this episode we examine commonly held belief that on-premise systems give system administrators greater levels of control and that that is better for security or other reasons. We explore the pros and cons of extra control, to what degree it is a benefit, and if it&apos;s worth it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>279</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1739495547</guid>
      <title>Root Causes 360: Joe Biden Deepfake Plays in New Hampshire Primary</title>
      <description><![CDATA[<p>A deepfake of Joe Biden's voice made an appearance in robocalls leading up to the New Hampshire primary. We discuss this latest development and its implications.</p>
]]></description>
      <pubDate>Tue, 6 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A deepfake of Joe Biden's voice made an appearance in robocalls leading up to the New Hampshire primary. We discuss this latest development and its implications.</p>
]]></content:encoded>
      <enclosure length="11406398" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1180996f-a939-4540-b7c8-e9dac32f7517/audio/c7d43638-7e9d-4ff1-b5a3-6c1fc9c09f77/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 360: Joe Biden Deepfake Plays in New Hampshire Primary</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1180996f-a939-4540-b7c8-e9dac32f7517/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:52</itunes:duration>
      <itunes:summary>A deepfake of Joe Biden&apos;s voice made an appearance in robocalls leading up to the New Hampshire primary. We discuss this latest development and its implications.</itunes:summary>
      <itunes:subtitle>A deepfake of Joe Biden&apos;s voice made an appearance in robocalls leading up to the New Hampshire primary. We discuss this latest development and its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>278</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1735840197</guid>
      <title>Root Causes 359: 90-day SSL Won&apos;t Affect Organization Validation Periods</title>
      <description><![CDATA[<p>With maximum 90-day term coming for public SSL certificates and DCV reuse also moving to 90 days, we explain why we do not expect a similar reduction in the reuse period for organization validation.</p>
]]></description>
      <pubDate>Fri, 2 Feb 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>With maximum 90-day term coming for public SSL certificates and DCV reuse also moving to 90 days, we explain why we do not expect a similar reduction in the reuse period for organization validation.</p>
]]></content:encoded>
      <enclosure length="15015233" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0fcbf292-ffd7-4665-8949-d1830806b405/audio/b84de08a-1d0f-428e-b8d1-6e283545f5ed/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 359: 90-day SSL Won&apos;t Affect Organization Validation Periods</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0fcbf292-ffd7-4665-8949-d1830806b405/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:37</itunes:duration>
      <itunes:summary>With maximum 90-day term coming for public SSL certificates and DCV reuse also moving to 90 days, we explain why we do not expect a similar reduction in the reuse period for organization validation.</itunes:summary>
      <itunes:subtitle>With maximum 90-day term coming for public SSL certificates and DCV reuse also moving to 90 days, we explain why we do not expect a similar reduction in the reuse period for organization validation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>277</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1732277916</guid>
      <title>Root Causes 358: Security Questionnaire Sins</title>
      <description><![CDATA[<p>In this episode we present a catalog of &quot;security questionnaire sins,&quot; which are avoidable problems and errors that frequently occur in the security questionnaires enterprises send to vendors.  Categories include difficulty of access, poor technical implementation, poor policies, and poor questions.</p>
]]></description>
      <pubDate>Tue, 30 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we present a catalog of &quot;security questionnaire sins,&quot; which are avoidable problems and errors that frequently occur in the security questionnaires enterprises send to vendors.  Categories include difficulty of access, poor technical implementation, poor policies, and poor questions.</p>
]]></content:encoded>
      <enclosure length="31843239" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4d3470f8-7026-4811-a0e1-f5dd0f34ea4f/audio/b9edb901-aa2e-40b4-8dc4-9c38a1860ad0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 358: Security Questionnaire Sins</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4d3470f8-7026-4811-a0e1-f5dd0f34ea4f/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:09</itunes:duration>
      <itunes:summary>In this episode we present a catalog of &quot;security questionnaire sins,&quot; which are avoidable problems and errors that frequently occur in the security questionnaires enterprises send to vendors.  Categories include difficulty of access, poor technical implementation, poor policies, and poor questions.</itunes:summary>
      <itunes:subtitle>In this episode we present a catalog of &quot;security questionnaire sins,&quot; which are avoidable problems and errors that frequently occur in the security questionnaires enterprises send to vendors.  Categories include difficulty of access, poor technical implementation, poor policies, and poor questions.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>276</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1728696624</guid>
      <title>Root Causes 357: Signed Digital Photographs</title>
      <description><![CDATA[<p>Three major camera manufacturers have joined to create a standard for signed digital images from their cameras.</p>
]]></description>
      <pubDate>Fri, 26 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Three major camera manufacturers have joined to create a standard for signed digital images from their cameras.</p>
]]></content:encoded>
      <enclosure length="11262736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d685fd16-eab6-43fc-bfa9-85243d91d6cd/audio/d7093590-6272-400e-8c51-2c0bb101cdae/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 357: Signed Digital Photographs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d685fd16-eab6-43fc-bfa9-85243d91d6cd/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:43</itunes:duration>
      <itunes:summary>Three major camera manufacturers have joined to create a standard for signed digital images from their cameras.</itunes:summary>
      <itunes:subtitle>Three major camera manufacturers have joined to create a standard for signed digital images from their cameras.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>275</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1725553281</guid>
      <title>Root Causes 356: Will MPDV Eliminate Email-based DCV?</title>
      <description><![CDATA[<p>Multi-perspective Domain Validation (MPDV) is a necessary evolution of Domain Control Validation (DCV) to protect against Border Gateway Protocol (BGP) attacks. We explore how MPDV may affect accepted DCV methods, especially the email method.</p>
]]></description>
      <pubDate>Mon, 22 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Multi-perspective Domain Validation (MPDV) is a necessary evolution of Domain Control Validation (DCV) to protect against Border Gateway Protocol (BGP) attacks. We explore how MPDV may affect accepted DCV methods, especially the email method.</p>
]]></content:encoded>
      <enclosure length="15834286" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c81bfcd4-9f44-45cb-8e23-170abe4e6d4d/audio/625d3616-881c-4f3b-8221-c321ef3df4d8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 356: Will MPDV Eliminate Email-based DCV?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c81bfcd4-9f44-45cb-8e23-170abe4e6d4d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:29</itunes:duration>
      <itunes:summary>Multi-perspective Domain Validation (MPDV) is a necessary evolution of Domain Control Validation (DCV) to protect against Border Gateway Protocol (BGP) attacks. We explore how MPDV may affect accepted DCV methods, especially the email method.</itunes:summary>
      <itunes:subtitle>Multi-perspective Domain Validation (MPDV) is a necessary evolution of Domain Control Validation (DCV) to protect against Border Gateway Protocol (BGP) attacks. We explore how MPDV may affect accepted DCV methods, especially the email method.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>274</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1722094614</guid>
      <title>Root Causes 355: Should a Managed PKI Provider Do Whatever the Customer Wants?</title>
      <description><![CDATA[<p>In this episode we explore whether a managed PKI provider should give complete control over PKI decisions to the end customer or if it should enforce certain minimum standards and principles regardless of what the customer asks for.</p>
]]></description>
      <pubDate>Fri, 19 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explore whether a managed PKI provider should give complete control over PKI decisions to the end customer or if it should enforce certain minimum standards and principles regardless of what the customer asks for.</p>
]]></content:encoded>
      <enclosure length="21620807" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0477efcf-a7f4-47dd-8e07-747f631c8989/audio/a5cd941a-cd80-453c-818f-a81e0137e6a4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 355: Should a Managed PKI Provider Do Whatever the Customer Wants?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0477efcf-a7f4-47dd-8e07-747f631c8989/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:30</itunes:duration>
      <itunes:summary>In this episode we explore whether a managed PKI provider should give complete control over PKI decisions to the end customer or if it should enforce certain minimum standards and principles regardless of what the customer asks for.</itunes:summary>
      <itunes:subtitle>In this episode we explore whether a managed PKI provider should give complete control over PKI decisions to the end customer or if it should enforce certain minimum standards and principles regardless of what the customer asks for.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>273</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1719235860</guid>
      <title>Root Causes 354: CyberSlash Attack Against CRYSTALS-Kyber</title>
      <description><![CDATA[<p>A newly published attack against common implementations of CRYSTALS-Kyber illustrates how cryptographic implementations can be vulnerable even if the cyphers themselves remain sound.</p>
]]></description>
      <pubDate>Tue, 16 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A newly published attack against common implementations of CRYSTALS-Kyber illustrates how cryptographic implementations can be vulnerable even if the cyphers themselves remain sound.</p>
]]></content:encoded>
      <enclosure length="11781171" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/adea7c51-1947-4c67-a122-73d2d24959d1/audio/b9373b42-06b9-445b-b799-d501d2b64140/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 354: CyberSlash Attack Against CRYSTALS-Kyber</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/adea7c51-1947-4c67-a122-73d2d24959d1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:15</itunes:duration>
      <itunes:summary>A newly published attack against common implementations of CRYSTALS-Kyber illustrates how cryptographic implementations can be vulnerable even if the cyphers themselves remain sound.</itunes:summary>
      <itunes:subtitle>A newly published attack against common implementations of CRYSTALS-Kyber illustrates how cryptographic implementations can be vulnerable even if the cyphers themselves remain sound.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>272</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1713774612</guid>
      <title>Root Causes 353: Why Isn&apos;t PKI Everywhere?</title>
      <description><![CDATA[<p>Our hosts firmly believe that PKI is a necessary component of all digital interactions.  And yet there are still gaps in PKI implementation.  We discuss these gaps and why they persist.</p>
]]></description>
      <pubDate>Tue, 9 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our hosts firmly believe that PKI is a necessary component of all digital interactions.  And yet there are still gaps in PKI implementation.  We discuss these gaps and why they persist.</p>
]]></content:encoded>
      <enclosure length="23204386" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d521c33e-6ca9-41e2-8395-6fe113557dc1/audio/74ff3b09-2bf0-487a-9a0b-17d8581129ad/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 353: Why Isn&apos;t PKI Everywhere?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d521c33e-6ca9-41e2-8395-6fe113557dc1/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:09</itunes:duration>
      <itunes:summary>Our hosts firmly believe that PKI is a necessary component of all digital interactions.  And yet there are still gaps in PKI implementation.  We discuss these gaps and why they persist.</itunes:summary>
      <itunes:subtitle>Our hosts firmly believe that PKI is a necessary component of all digital interactions.  And yet there are still gaps in PKI implementation.  We discuss these gaps and why they persist.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>271</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1708200531</guid>
      <title>Root Causes 352: FBI Vs. End-to-end Encryption in Meta Apps</title>
      <description><![CDATA[<p>Meta is finally rolling out end-to-end encryption across its messaging apps. This is the latest chapter in the long story of government versus encryption.  We rant a little about this.</p>
]]></description>
      <pubDate>Thu, 4 Jan 2024 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Meta is finally rolling out end-to-end encryption across its messaging apps. This is the latest chapter in the long story of government versus encryption.  We rant a little about this.</p>
]]></content:encoded>
      <enclosure length="14740647" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8a38a15a-52fb-4d1e-91c6-69ae29ba53f7/audio/c99f68dd-1c2a-4b28-896b-96c802488710/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 352: FBI Vs. End-to-end Encryption in Meta Apps</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8a38a15a-52fb-4d1e-91c6-69ae29ba53f7/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:20</itunes:duration>
      <itunes:summary>Meta is finally rolling out end-to-end encryption across its messaging apps. This is the latest chapter in the long story of government versus encryption.  We rant a little about this.</itunes:summary>
      <itunes:subtitle>Meta is finally rolling out end-to-end encryption across its messaging apps. This is the latest chapter in the long story of government versus encryption.  We rant a little about this.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>270</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1701117078</guid>
      <title>Root Causes 351: 2024 Predictions</title>
      <description><![CDATA[<p>We look forward to 2024 and predict trends for PKI, certificates, and digital identity. We discuss shortening certificate lifespans, Multi-perspective Domain Validation (MPDV), eIDAS 2.0, OCSP, post-quantum cryptography (PQC), Certificate Lifecycle Management (CLM), passwords, root stores, and government versus encryption. Plus, will Jason be sent to the gulag for not being Canadian enough?</p>
]]></description>
      <pubDate>Wed, 27 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We look forward to 2024 and predict trends for PKI, certificates, and digital identity. We discuss shortening certificate lifespans, Multi-perspective Domain Validation (MPDV), eIDAS 2.0, OCSP, post-quantum cryptography (PQC), Certificate Lifecycle Management (CLM), passwords, root stores, and government versus encryption. Plus, will Jason be sent to the gulag for not being Canadian enough?</p>
]]></content:encoded>
      <enclosure length="17430939" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d7837649-ece6-4d8c-87a1-c92b96fe3cc4/audio/d8990215-eccd-4e19-83e9-2e3f9ddeeb77/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 351: 2024 Predictions</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d7837649-ece6-4d8c-87a1-c92b96fe3cc4/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:08</itunes:duration>
      <itunes:summary>We look forward to 2024 and predict trends for PKI, certificates, and digital identity. We discuss shortening certificate lifespans, Multi-perspective Domain Validation (MPDV), eIDAS 2.0, OCSP, post-quantum cryptography (PQC), Certificate Lifecycle Management (CLM), passwords, root stores, and government versus encryption. Plus, will Jason be sent to the gulag for not being Canadian enough?</itunes:summary>
      <itunes:subtitle>We look forward to 2024 and predict trends for PKI, certificates, and digital identity. We discuss shortening certificate lifespans, Multi-perspective Domain Validation (MPDV), eIDAS 2.0, OCSP, post-quantum cryptography (PQC), Certificate Lifecycle Management (CLM), passwords, root stores, and government versus encryption. Plus, will Jason be sent to the gulag for not being Canadian enough?</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>269</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1696295664</guid>
      <title>Root Causes 350: Public Certificates and the GDPR Right to Be Forgotten</title>
      <description><![CDATA[<p>GDPR provides a &quot;right to be forgotten,&quot; whereby individuals can demand the removal of PII from IT systems. This can run directly contrary to the transparency and permanence built into the DNA of public PKI systems. We explore this conundrum.</p>
]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>GDPR provides a &quot;right to be forgotten,&quot; whereby individuals can demand the removal of PII from IT systems. This can run directly contrary to the transparency and permanence built into the DNA of public PKI systems. We explore this conundrum.</p>
]]></content:encoded>
      <enclosure length="14833707" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/50a5cfab-1d0e-4368-b784-44ba8ce30ebc/audio/198c48d5-af4d-4bb1-a5e2-1f3a51cdd910/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 350: Public Certificates and the GDPR Right to Be Forgotten</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/50a5cfab-1d0e-4368-b784-44ba8ce30ebc/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:26</itunes:duration>
      <itunes:summary>GDPR provides a &quot;right to be forgotten,&quot; whereby individuals can demand the removal of PII from IT systems. This can run directly contrary to the transparency and permanence built into the DNA of public PKI systems. We explore this conundrum.</itunes:summary>
      <itunes:subtitle>GDPR provides a &quot;right to be forgotten,&quot; whereby individuals can demand the removal of PII from IT systems. This can run directly contrary to the transparency and permanence built into the DNA of public PKI systems. We explore this conundrum.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>268</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1693405557</guid>
      <title>Root Causes 349: 2023 Lookback - Overall Trends</title>
      <description><![CDATA[<p>We look back at PKI in 2023. Trends include artificial intelligence, enterprise crypto agility, the fall of OCSP, PKI everywhere, the weakness of passwords, and government versus the internet. We also look at last year's predictions and compare them to the year's events.</p>
]]></description>
      <pubDate>Mon, 18 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We look back at PKI in 2023. Trends include artificial intelligence, enterprise crypto agility, the fall of OCSP, PKI everywhere, the weakness of passwords, and government versus the internet. We also look at last year's predictions and compare them to the year's events.</p>
]]></content:encoded>
      <enclosure length="21718306" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6499edfd-4fe7-47e0-aecd-4b2a91951c1c/audio/9359b076-5ea1-41ca-b4a1-8d05ea9f224d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 349: 2023 Lookback - Overall Trends</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6499edfd-4fe7-47e0-aecd-4b2a91951c1c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:36</itunes:duration>
      <itunes:summary>We look back at PKI in 2023. Trends include artificial intelligence, enterprise crypto agility, the fall of OCSP, PKI everywhere, the weakness of passwords, and government versus the internet. We also look at last year&apos;s predictions and compare them to the year&apos;s events.</itunes:summary>
      <itunes:subtitle>We look back at PKI in 2023. Trends include artificial intelligence, enterprise crypto agility, the fall of OCSP, PKI everywhere, the weakness of passwords, and government versus the internet. We also look at last year&apos;s predictions and compare them to the year&apos;s events.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>267</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1691294871</guid>
      <title>Root Causes 348: What Is a Merkle Tree?</title>
      <description><![CDATA[<p>One foundational element of modern cryptographic systems is the Merkle tree.  Merkle tree is an enabler of blockchain and CT logs, among other things. We explain this data structure, its properties, and its use cases.</p>
]]></description>
      <pubDate>Fri, 15 Dec 2023 16:22:34 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One foundational element of modern cryptographic systems is the Merkle tree.  Merkle tree is an enabler of blockchain and CT logs, among other things. We explain this data structure, its properties, and its use cases.</p>
]]></content:encoded>
      <enclosure length="11613344" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a17961ca-f336-4632-a7bb-af4d221427bb/audio/8afd4125-5603-4214-9e2c-d22a8df02120/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 348: What Is a Merkle Tree?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a17961ca-f336-4632-a7bb-af4d221427bb/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:05</itunes:duration>
      <itunes:summary>One foundational element of modern cryptographic systems is the Merkle tree.  Merkle tree is an enabler of blockchain and CT logs, among other things. We explain this data structure, its properties, and its use cases.</itunes:summary>
      <itunes:subtitle>One foundational element of modern cryptographic systems is the Merkle tree.  Merkle tree is an enabler of blockchain and CT logs, among other things. We explain this data structure, its properties, and its use cases.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>266</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1687927818</guid>
      <title>Root Causes 347: 2023 Lookback - Shortening Certificate Lifespans</title>
      <description><![CDATA[<p>90-day SSL certificates is only part of it!  2023 has been a year of certificate lifespans getting shorter.  We review these trends.</p>
]]></description>
      <pubDate>Mon, 11 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>90-day SSL certificates is only part of it!  2023 has been a year of certificate lifespans getting shorter.  We review these trends.</p>
]]></content:encoded>
      <enclosure length="17980474" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ffd19f64-513d-4cf0-bac6-55740f0b7195/audio/61fda5e6-c4ff-4aa8-999c-2609c64edfa9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 347: 2023 Lookback - Shortening Certificate Lifespans</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ffd19f64-513d-4cf0-bac6-55740f0b7195/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:43</itunes:duration>
      <itunes:summary>90-day SSL certificates is only part of it!  2023 has been a year of certificate lifespans getting shorter.  We review these trends.</itunes:summary>
      <itunes:subtitle>90-day SSL certificates is only part of it!  2023 has been a year of certificate lifespans getting shorter.  We review these trends.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>265</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1685920107</guid>
      <title>Root Causes 346: Private Credentials In Public Code</title>
      <description><![CDATA[<p>In this episode we uncover the epidemic of private credentials in public-facing code repositories, including why it occurs and what do to about it.</p>
]]></description>
      <pubDate>Fri, 8 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we uncover the epidemic of private credentials in public-facing code repositories, including why it occurs and what do to about it.</p>
]]></content:encoded>
      <enclosure length="14873517" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1be1f63-01e2-4713-9f17-6b717f36735a/audio/41d6e6e3-04f4-4b58-9b93-b96287ee8ee0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 346: Private Credentials In Public Code</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1be1f63-01e2-4713-9f17-6b717f36735a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:29</itunes:duration>
      <itunes:summary>In this episode we uncover the epidemic of private credentials in public-facing code repositories, including why it occurs and what do to about it.</itunes:summary>
      <itunes:subtitle>In this episode we uncover the epidemic of private credentials in public-facing code repositories, including why it occurs and what do to about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>264</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1683182409</guid>
      <title>Root Causes 345: Apple Versus European Sideloading</title>
      <description><![CDATA[<p>The European Union is applying pressure to Apple to allow sideloading of applications. We go over why this is occurring, the potential dangers, and Apple's response.</p>
]]></description>
      <pubDate>Tue, 5 Dec 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The European Union is applying pressure to Apple to allow sideloading of applications. We go over why this is occurring, the potential dangers, and Apple's response.</p>
]]></content:encoded>
      <enclosure length="12170534" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1c860f43-43df-4bd2-978c-059d66a54716/audio/cc15ca32-2ad9-472c-b562-69f780d61ad1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 345: Apple Versus European Sideloading</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1c860f43-43df-4bd2-978c-059d66a54716/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:40</itunes:duration>
      <itunes:summary>The European Union is applying pressure to Apple to allow sideloading of applications. We go over why this is occurring, the potential dangers, and Apple&apos;s response.</itunes:summary>
      <itunes:subtitle>The European Union is applying pressure to Apple to allow sideloading of applications. We go over why this is occurring, the potential dangers, and Apple&apos;s response.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>263</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1677767325</guid>
      <title>Root Causes 344: Introducing the PQC Onramp</title>
      <description><![CDATA[<p>NIST's Round 3 competition has yielded winners for standardization. But NIST wants to continue finding additional potential algorithms, especially those using non-Lattice schemes. We explain the PQC &quot;onramp&quot; and what we should expect.</p>
]]></description>
      <pubDate>Wed, 29 Nov 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST's Round 3 competition has yielded winners for standardization. But NIST wants to continue finding additional potential algorithms, especially those using non-Lattice schemes. We explain the PQC &quot;onramp&quot; and what we should expect.</p>
]]></content:encoded>
      <enclosure length="16264741" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/36a3ed68-6d91-4bec-92cf-bdbe2a618e86/audio/3cc1796a-5a09-42e8-a774-913ddb1f89c0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 344: Introducing the PQC Onramp</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/36a3ed68-6d91-4bec-92cf-bdbe2a618e86/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:56</itunes:duration>
      <itunes:summary>NIST&apos;s Round 3 competition has yielded winners for standardization. But NIST wants to continue finding additional potential algorithms, especially those using non-Lattice schemes. We explain the PQC &quot;onramp&quot; and what we should expect.</itunes:summary>
      <itunes:subtitle>NIST&apos;s Round 3 competition has yielded winners for standardization. But NIST wants to continue finding additional potential algorithms, especially those using non-Lattice schemes. We explain the PQC &quot;onramp&quot; and what we should expect.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>262</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1671976164</guid>
      <title>Root Causes 343: The EIDAS 2.0 Controversy</title>
      <description><![CDATA[<p>ETSI is preparing to release specifications for eIDAS 2.0. One controversial aspect of this new standard is that it limits browsers' ability to determine their own trusted roots. In this episode we explain this limitation and the concerns surrounding it.</p>
]]></description>
      <pubDate>Wed, 22 Nov 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>ETSI is preparing to release specifications for eIDAS 2.0. One controversial aspect of this new standard is that it limits browsers' ability to determine their own trusted roots. In this episode we explain this limitation and the concerns surrounding it.</p>
]]></content:encoded>
      <enclosure length="24948898" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d1501258-3beb-4628-9590-0d300b45e06e/audio/8ff68ccb-815b-4c20-9c02-bd16314a6c92/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 343: The EIDAS 2.0 Controversy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d1501258-3beb-4628-9590-0d300b45e06e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:58</itunes:duration>
      <itunes:summary>ETSI is preparing to release specifications for eIDAS 2.0. One controversial aspect of this new standard is that it limits browsers&apos; ability to determine their own trusted roots. In this episode we explain this limitation and the concerns surrounding it.</itunes:summary>
      <itunes:subtitle>ETSI is preparing to release specifications for eIDAS 2.0. One controversial aspect of this new standard is that it limits browsers&apos; ability to determine their own trusted roots. In this episode we explain this limitation and the concerns surrounding it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>261</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1667482446</guid>
      <title>Root Causes 342: Don&apos;t Change Your Password for Two Years</title>
      <description><![CDATA[<p>The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They don't, however, specify a frequency at which these forced changes must occur. Rather, they set the MINIMUM time before forced password changes can happen. Join us to learn why.</p>
]]></description>
      <pubDate>Fri, 17 Nov 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They don't, however, specify a frequency at which these forced changes must occur. Rather, they set the MINIMUM time before forced password changes can happen. Join us to learn why.</p>
]]></content:encoded>
      <enclosure length="10928306" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4b68cf9c-9e7f-4792-af1a-0a7fbcb914d5/audio/bdb281eb-edc9-47bc-bd98-1788a3d41a57/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 342: Don&apos;t Change Your Password for Two Years</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4b68cf9c-9e7f-4792-af1a-0a7fbcb914d5/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:22</itunes:duration>
      <itunes:summary>The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They don&apos;t, however, specify a frequency at which these forced changes must occur. Rather, they set the MINIMUM time before forced password changes can happen. Join us to learn why.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They don&apos;t, however, specify a frequency at which these forced changes must occur. Rather, they set the MINIMUM time before forced password changes can happen. Join us to learn why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>260</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1664111133</guid>
      <title>Root Causes 341: The Trouble with Security Questionnaires</title>
      <description><![CDATA[<p>The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise. In this episode we describe how security questionnaires are changing and the pitfalls associated with this emerging practice.</p>
]]></description>
      <pubDate>Mon, 13 Nov 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise. In this episode we describe how security questionnaires are changing and the pitfalls associated with this emerging practice.</p>
]]></content:encoded>
      <enclosure length="18681267" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2f3ae72d-9466-45f6-ab39-3abb727afdee/audio/06115dee-458e-4ebe-ad5c-b58545a59187/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 341: The Trouble with Security Questionnaires</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2f3ae72d-9466-45f6-ab39-3abb727afdee/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:27</itunes:duration>
      <itunes:summary>The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise. In this episode we describe how security questionnaires are changing and the pitfalls associated with this emerging practice.</itunes:summary>
      <itunes:subtitle>The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise. In this episode we describe how security questionnaires are changing and the pitfalls associated with this emerging practice.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>259</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1657740411</guid>
      <title>Root Causes 340: Is This Podcast Canadian Enough?</title>
      <description><![CDATA[<p>Canada's Online Streaming Act will require internet content providers to provide a minimum percentage of content produced by Canadians or face fines. We explore this latest episode in the theme of governments attempting to control the free flow of information on the internet.</p>
]]></description>
      <pubDate>Mon, 6 Nov 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Canada's Online Streaming Act will require internet content providers to provide a minimum percentage of content produced by Canadians or face fines. We explore this latest episode in the theme of governments attempting to control the free flow of information on the internet.</p>
]]></content:encoded>
      <enclosure length="13673130" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e5311c8d-a470-43cf-bdb5-9252d0b717ce/audio/b010f912-c662-4cb0-bf61-20b217fbdea8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 340: Is This Podcast Canadian Enough?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e5311c8d-a470-43cf-bdb5-9252d0b717ce/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:14</itunes:duration>
      <itunes:summary>Canada&apos;s Online Streaming Act will require internet content providers to provide a minimum percentage of content produced by Canadians or face fines. We explore this latest episode in the theme of governments attempting to control the free flow of information on the internet.</itunes:summary>
      <itunes:subtitle>Canada&apos;s Online Streaming Act will require internet content providers to provide a minimum percentage of content produced by Canadians or face fines. We explore this latest episode in the theme of governments attempting to control the free flow of information on the internet.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>258</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1653613314</guid>
      <title>Root Causes 339: The ROI of CLM</title>
      <description><![CDATA[<p>In this episode we describe at a high level how to calculate the Total Cost of Ownership (TCO) of CLM as opposed to manual installation and management of certificates.</p>
]]></description>
      <pubDate>Tue, 31 Oct 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe at a high level how to calculate the Total Cost of Ownership (TCO) of CLM as opposed to manual installation and management of certificates.</p>
]]></content:encoded>
      <enclosure length="10919449" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/49e95888-d5de-439b-9448-50ca992fbece/audio/a32f11db-f5d9-4c43-8c4f-12f741a15535/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 339: The ROI of CLM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/49e95888-d5de-439b-9448-50ca992fbece/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:21</itunes:duration>
      <itunes:summary>In this episode we describe at a high level how to calculate the Total Cost of Ownership (TCO) of CLM as opposed to manual installation and management of certificates.</itunes:summary>
      <itunes:subtitle>In this episode we describe at a high level how to calculate the Total Cost of Ownership (TCO) of CLM as opposed to manual installation and management of certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>257</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1647354646</guid>
      <title>Root Causes 338: CLM and Your Career as an IT Professional</title>
      <description><![CDATA[<p>In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals and can help progress careers and improve work life.</p>
]]></description>
      <pubDate>Mon, 23 Oct 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals and can help progress careers and improve work life.</p>
]]></content:encoded>
      <enclosure length="18556958" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/439d4220-8ba1-45a0-b544-2c77d5b57a67/audio/91fbe8ad-31ef-49b1-87bc-a7a380f0e5b9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 338: CLM and Your Career as an IT Professional</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/439d4220-8ba1-45a0-b544-2c77d5b57a67/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:19</itunes:duration>
      <itunes:summary>In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals and can help progress careers and improve work life.</itunes:summary>
      <itunes:subtitle>In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals and can help progress careers and improve work life.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>256</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1636843149</guid>
      <title>Root Causes 337: CLM and the IT Skills Gap</title>
      <description><![CDATA[<p>For decades industry has had more need for skilled IT employees than the workforce could provide. In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.</p>
]]></description>
      <pubDate>Tue, 10 Oct 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For decades industry has had more need for skilled IT employees than the workforce could provide. In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.</p>
]]></content:encoded>
      <enclosure length="19761162" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e81c27d0-80fa-4116-ae1b-a0584cc206b3/audio/047d63a9-cdef-4efd-9824-cba408b168aa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 337: CLM and the IT Skills Gap</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e81c27d0-80fa-4116-ae1b-a0584cc206b3/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:34</itunes:duration>
      <itunes:summary>For decades industry has had more need for skilled IT employees than the workforce could provide. In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.</itunes:summary>
      <itunes:subtitle>For decades industry has had more need for skilled IT employees than the workforce could provide. In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>255</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1631756766</guid>
      <title>Root Causes 336: Digitally Signing Images on Cameras</title>
      <description><![CDATA[<p>A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images. We describe what such an ecosystem would do, where it could do in the future, and the advantages and limitations of these schemes.</p>
]]></description>
      <pubDate>Tue, 3 Oct 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images. We describe what such an ecosystem would do, where it could do in the future, and the advantages and limitations of these schemes.</p>
]]></content:encoded>
      <enclosure length="13655576" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fa39c902-941c-44dc-9a6f-987c2cd49605/audio/16c27e5c-afc3-452c-8498-4a885fd0b850/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 336: Digitally Signing Images on Cameras</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fa39c902-941c-44dc-9a6f-987c2cd49605/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:12</itunes:duration>
      <itunes:summary>A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images. We describe what such an ecosystem would do, where it could do in the future, and the advantages and limitations of these schemes.</itunes:summary>
      <itunes:subtitle>A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images. We describe what such an ecosystem would do, where it could do in the future, and the advantages and limitations of these schemes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>254</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1628679435</guid>
      <title>Root Causes 335: When MFA Is Not MFA</title>
      <description><![CDATA[<p>In this episode we describe a social engineering attack to steal a one-time password (OTP) to enable unauthorized access. This incident further exploited a cloud backup feature to extend the scope of the breach.  We explain.</p>
]]></description>
      <pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe a social engineering attack to steal a one-time password (OTP) to enable unauthorized access. This incident further exploited a cloud backup feature to extend the scope of the breach.  We explain.</p>
]]></content:encoded>
      <enclosure length="9439518" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/121cfeee-5def-48c1-b67f-75e4a172a12c/audio/23044a45-6dcf-49f8-89f4-5be8354190c9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 335: When MFA Is Not MFA</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/121cfeee-5def-48c1-b67f-75e4a172a12c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:49</itunes:duration>
      <itunes:summary>In this episode we describe a social engineering attack to steal a one-time password (OTP) to enable unauthorized access. This incident further exploited a cloud backup feature to extend the scope of the breach.  We explain.</itunes:summary>
      <itunes:subtitle>In this episode we describe a social engineering attack to steal a one-time password (OTP) to enable unauthorized access. This incident further exploited a cloud backup feature to extend the scope of the breach.  We explain.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>253</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1626863355</guid>
      <title>Root Causes 334: What Is Attestation on the Web?</title>
      <description><![CDATA[<p>Most people hate dealing with CAPTCHA, but it offers great benefits for web site operators.  In this episode we discuss alternatives to CAPTCHA, how they work, and their pros and cons.  Plus, the Get-Off-My-Lawn! browser returns.</p>
]]></description>
      <pubDate>Tue, 26 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Most people hate dealing with CAPTCHA, but it offers great benefits for web site operators.  In this episode we discuss alternatives to CAPTCHA, how they work, and their pros and cons.  Plus, the Get-Off-My-Lawn! browser returns.</p>
]]></content:encoded>
      <enclosure length="17334569" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fae428e7-79d4-4f27-a4d4-fabb4081dbef/audio/f010ea49-9c25-47a6-b4e2-c164a9556f8a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 334: What Is Attestation on the Web?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fae428e7-79d4-4f27-a4d4-fabb4081dbef/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:02</itunes:duration>
      <itunes:summary>Most people hate dealing with CAPTCHA, but it offers great benefits for web site operators.  In this episode we discuss alternatives to CAPTCHA, how they work, and their pros and cons.  Plus, the Get-Off-My-Lawn! browser returns.</itunes:summary>
      <itunes:subtitle>Most people hate dealing with CAPTCHA, but it offers great benefits for web site operators.  In this episode we discuss alternatives to CAPTCHA, how they work, and their pros and cons.  Plus, the Get-Off-My-Lawn! browser returns.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>252</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1621729950</guid>
      <title>Root Causes 333: Intel Side Channel Attack Steals Private Keys</title>
      <description><![CDATA[<p>A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.</p>
]]></description>
      <pubDate>Wed, 20 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.</p>
]]></content:encoded>
      <enclosure length="16238648" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ac60e696-b384-4720-a981-4f45a16b3758/audio/182def16-900e-4736-897e-8242fe41c3b0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 333: Intel Side Channel Attack Steals Private Keys</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ac60e696-b384-4720-a981-4f45a16b3758/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:54</itunes:duration>
      <itunes:summary>A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.</itunes:summary>
      <itunes:subtitle>A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>251</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1617440298</guid>
      <title>Root Causes 332: Acoustic AI-based Key Logging Attack</title>
      <description><![CDATA[<p>Researchers have built an AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call.  Among other things, this technique can be used to steal passwords when the sound of logging in can be overheard. Join us as we learn about this new breed of credential harvesting.</p>
]]></description>
      <pubDate>Thu, 14 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Researchers have built an AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call.  Among other things, this technique can be used to steal passwords when the sound of logging in can be overheard. Join us as we learn about this new breed of credential harvesting.</p>
]]></content:encoded>
      <enclosure length="10180269" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d887ea0c-365b-475f-992b-b2db2ba30eda/audio/f8873c09-7437-485f-a28d-7bb95e34c819/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 332: Acoustic AI-based Key Logging Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d887ea0c-365b-475f-992b-b2db2ba30eda/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:35</itunes:duration>
      <itunes:summary>Researchers have built an AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call.  Among other things, this technique can be used to steal passwords when the sound of logging in can be overheard. Join us as we learn about this new breed of credential harvesting.</itunes:summary>
      <itunes:subtitle>Researchers have built an AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call.  Among other things, this technique can be used to steal passwords when the sound of logging in can be overheard. Join us as we learn about this new breed of credential harvesting.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>250</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1615552317</guid>
      <title>Root Causes 331: Microsoft Restores Trust to VeriSign Code Signing Root</title>
      <description><![CDATA[<p>Recent erroneous behavior for certain applications on Windows has drawn attention to the Microsoft trusted root store.  It turns out that Microsoft removed - and then re-added - a legacy VeriSign root in its trusted roots list.  We give you the details of what went on and why.</p>
]]></description>
      <pubDate>Wed, 13 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent erroneous behavior for certain applications on Windows has drawn attention to the Microsoft trusted root store.  It turns out that Microsoft removed - and then re-added - a legacy VeriSign root in its trusted roots list.  We give you the details of what went on and why.</p>
]]></content:encoded>
      <enclosure length="13647031" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/708afdb4-747b-426e-b4ec-ea71466e548d/audio/3073df51-cd79-4c52-b14f-d671f008bbb9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 331: Microsoft Restores Trust to VeriSign Code Signing Root</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/708afdb4-747b-426e-b4ec-ea71466e548d/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:12</itunes:duration>
      <itunes:summary>Recent erroneous behavior for certain applications on Windows has drawn attention to the Microsoft trusted root store.  It turns out that Microsoft removed - and then re-added - a legacy VeriSign root in its trusted roots list.  We give you the details of what went on and why.</itunes:summary>
      <itunes:subtitle>Recent erroneous behavior for certain applications on Windows has drawn attention to the Microsoft trusted root store.  It turns out that Microsoft removed - and then re-added - a legacy VeriSign root in its trusted roots list.  We give you the details of what went on and why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>249</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1609150458</guid>
      <title>Root Causes 330: End-to-end PQC in Use Today</title>
      <description><![CDATA[<p>Our hosts are joined by IronCap CEO Andrew Cheung as he discusses commercially available PQC solutions today, including VPN, email, and crypto currency.</p>
]]></description>
      <pubDate>Tue, 5 Sep 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our hosts are joined by IronCap CEO Andrew Cheung as he discusses commercially available PQC solutions today, including VPN, email, and crypto currency.</p>
]]></content:encoded>
      <enclosure length="20849318" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4a4683e-ef3f-4678-bed3-3b81edb4e608/audio/d088d861-9f25-493a-9402-ae0fe5dc2e19/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 330: End-to-end PQC in Use Today</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4a4683e-ef3f-4678-bed3-3b81edb4e608/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:42</itunes:duration>
      <itunes:summary>Our hosts are joined by IronCap CEO Andrew Cheung as he discusses commercially available PQC solutions today, including VPN, email, and crypto currency.</itunes:summary>
      <itunes:subtitle>Our hosts are joined by IronCap CEO Andrew Cheung as he discusses commercially available PQC solutions today, including VPN, email, and crypto currency.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>248</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1603819845</guid>
      <title>Root Causes 329: What Is Messaging Layer Security?</title>
      <description><![CDATA[<p>The recently published Messaging Layer Security (MLS) protocol establishes key exchange protocols for participants in a simultaneous communication session for three or more participants. We explain its significance and possible futures for this standard.</p>
]]></description>
      <pubDate>Tue, 29 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recently published Messaging Layer Security (MLS) protocol establishes key exchange protocols for participants in a simultaneous communication session for three or more participants. We explain its significance and possible futures for this standard.</p>
]]></content:encoded>
      <enclosure length="10533154" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4831dd1f-e958-48ec-ac7d-b3e19d9b7f07/audio/3feb6ab1-6e7a-44de-b381-61cafc993ee9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 329: What Is Messaging Layer Security?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4831dd1f-e958-48ec-ac7d-b3e19d9b7f07/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:57</itunes:duration>
      <itunes:summary>The recently published Messaging Layer Security (MLS) protocol establishes key exchange protocols for participants in a simultaneous communication session for three or more participants. We explain its significance and possible futures for this standard.</itunes:summary>
      <itunes:subtitle>The recently published Messaging Layer Security (MLS) protocol establishes key exchange protocols for participants in a simultaneous communication session for three or more participants. We explain its significance and possible futures for this standard.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>247</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1599597372</guid>
      <title>Root Causes 328: What Is the Debian Weak Key Flaw?</title>
      <description><![CDATA[<p>In 2008 the world of SSL was shocked by the discovery of a flaw in a popular operating system that limited the total set of possible private keys on this OS to about 32,000. We explain what happened, industry response, and its consequences.</p>
]]></description>
      <pubDate>Wed, 23 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In 2008 the world of SSL was shocked by the discovery of a flaw in a popular operating system that limited the total set of possible private keys on this OS to about 32,000. We explain what happened, industry response, and its consequences.</p>
]]></content:encoded>
      <enclosure length="6709755" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7976a37c-09c8-4e88-ac42-dd827f5adc02/audio/5366e689-53d3-41e3-b466-b989b5907d45/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 328: What Is the Debian Weak Key Flaw?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7976a37c-09c8-4e88-ac42-dd827f5adc02/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:58</itunes:duration>
      <itunes:summary>In 2008 the world of SSL was shocked by the discovery of a flaw in a popular operating system that limited the total set of possible private keys on this OS to about 32,000. We explain what happened, industry response, and its consequences.</itunes:summary>
      <itunes:subtitle>In 2008 the world of SSL was shocked by the discovery of a flaw in a popular operating system that limited the total set of possible private keys on this OS to about 32,000. We explain what happened, industry response, and its consequences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>246</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1596047181</guid>
      <title>Root Causes 327: What Is Multi-perspective Domain Validation?</title>
      <description><![CDATA[<p>In this episode we explain Border Gateway Protocol (BGP) attacks and how multi-perspective domain validation (MPDV, also known as multi-vantage point domain validation) can defeat them.</p>
]]></description>
      <pubDate>Fri, 18 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain Border Gateway Protocol (BGP) attacks and how multi-perspective domain validation (MPDV, also known as multi-vantage point domain validation) can defeat them.</p>
]]></content:encoded>
      <enclosure length="16255510" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/76e29d96-9c6c-427e-aa50-4f45f5ba7419/audio/c9a1cae9-21b7-4f69-980a-090afabb018b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 327: What Is Multi-perspective Domain Validation?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/76e29d96-9c6c-427e-aa50-4f45f5ba7419/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:55</itunes:duration>
      <itunes:summary>In this episode we explain Border Gateway Protocol (BGP) attacks and how multi-perspective domain validation (MPDV, also known as multi-vantage point domain validation) can defeat them.</itunes:summary>
      <itunes:subtitle>In this episode we explain Border Gateway Protocol (BGP) attacks and how multi-perspective domain validation (MPDV, also known as multi-vantage point domain validation) can defeat them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>245</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1593936705</guid>
      <title>Root Causes 326: The Difference Between .ml and .mil</title>
      <description><![CDATA[<p>A recent Financial Times article reveals that mistyped email addresses aimed at the US military frequently are sent to email addresses in Mali instead, to the tune of hundreds of thousands per year.  Some of this includes sensitive military content.</p>
]]></description>
      <pubDate>Tue, 15 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent Financial Times article reveals that mistyped email addresses aimed at the US military frequently are sent to email addresses in Mali instead, to the tune of hundreds of thousands per year.  Some of this includes sensitive military content.</p>
]]></content:encoded>
      <enclosure length="11181462" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/49a14e89-1f26-465f-a810-e35b3a4f4eeb/audio/203ecc84-22f7-4226-9ece-d508d2da40bf/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 326: The Difference Between .ml and .mil</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/49a14e89-1f26-465f-a810-e35b3a4f4eeb/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:38</itunes:duration>
      <itunes:summary>A recent Financial Times article reveals that mistyped email addresses aimed at the US military frequently are sent to email addresses in Mali instead, to the tune of hundreds of thousands per year.  Some of this includes sensitive military content.</itunes:summary>
      <itunes:subtitle>A recent Financial Times article reveals that mistyped email addresses aimed at the US military frequently are sent to email addresses in Mali instead, to the tune of hundreds of thousands per year.  Some of this includes sensitive military content.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>244</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1590862407</guid>
      <title>Root Causes 325: Certificate Error Causes Sharepoint Outage</title>
      <description><![CDATA[<p>A recent outage in Microsoft Sharepoint was caused by an error in certificate installation. We explain what happened and the lessons to be learned.</p>
]]></description>
      <pubDate>Fri, 11 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent outage in Microsoft Sharepoint was caused by an error in certificate installation. We explain what happened and the lessons to be learned.</p>
]]></content:encoded>
      <enclosure length="9265337" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/02e2875f-031a-4001-ad88-3b778d4f1607/audio/54ced37f-8723-49de-a1c4-c00221a8da93/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 325: Certificate Error Causes Sharepoint Outage</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/02e2875f-031a-4001-ad88-3b778d4f1607/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:38</itunes:duration>
      <itunes:summary>A recent outage in Microsoft Sharepoint was caused by an error in certificate installation. We explain what happened and the lessons to be learned.</itunes:summary>
      <itunes:subtitle>A recent outage in Microsoft Sharepoint was caused by an error in certificate installation. We explain what happened and the lessons to be learned.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>243</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1585817747</guid>
      <title>Root Causes 324: Apple Vs New UK Surveillance Bill</title>
      <description><![CDATA[<p>The battle between government and encryption continues. The UK is attempting to build secret back doors into end-to-end encrypted services. In response, Apple has threatened to remove Apple services from the UK, including FaceTime and iMessage.</p>
]]></description>
      <pubDate>Mon, 7 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The battle between government and encryption continues. The UK is attempting to build secret back doors into end-to-end encrypted services. In response, Apple has threatened to remove Apple services from the UK, including FaceTime and iMessage.</p>
]]></content:encoded>
      <enclosure length="15023231" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4a54ceec-38af-4c73-a474-0bf488664ae5/audio/34cf6c5b-8e90-4586-ba97-12242b13e56a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 324: Apple Vs New UK Surveillance Bill</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4a54ceec-38af-4c73-a474-0bf488664ae5/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:38</itunes:duration>
      <itunes:summary>The battle between government and encryption continues. The UK is attempting to build secret back doors into end-to-end encrypted services. In response, Apple has threatened to remove Apple services from the UK, including FaceTime and iMessage.</itunes:summary>
      <itunes:subtitle>The battle between government and encryption continues. The UK is attempting to build secret back doors into end-to-end encrypted services. In response, Apple has threatened to remove Apple services from the UK, including FaceTime and iMessage.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>242</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1581989575</guid>
      <title>Root Causes 323: Update on Microsoft Key Compromise</title>
      <description><![CDATA[<p>In this follow up to our episode 320, we describe Microsoft's actions to mitigate this attack and explain new understanding that shows its impact to be broader than originally thought. Anyone using the Microsoft stack needs to understand this new threat.</p>
]]></description>
      <pubDate>Wed, 2 Aug 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this follow up to our episode 320, we describe Microsoft's actions to mitigate this attack and explain new understanding that shows its impact to be broader than originally thought. Anyone using the Microsoft stack needs to understand this new threat.</p>
]]></content:encoded>
      <enclosure length="11755820" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1185210-e1fc-4470-ac4f-0da847466b26/audio/59c7f453-7515-449b-91eb-5ac44f5b62c8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 323: Update on Microsoft Key Compromise</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1185210-e1fc-4470-ac4f-0da847466b26/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:14</itunes:duration>
      <itunes:summary>In this follow up to our episode 320, we describe Microsoft&apos;s actions to mitigate this attack and explain new understanding that shows its impact to be broader than originally thought. Anyone using the Microsoft stack needs to understand this new threat.</itunes:summary>
      <itunes:subtitle>In this follow up to our episode 320, we describe Microsoft&apos;s actions to mitigate this attack and explain new understanding that shows its impact to be broader than originally thought. Anyone using the Microsoft stack needs to understand this new threat.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>241</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1579312471</guid>
      <title>Root Causes 322: RIP Kevin Mitnick</title>
      <description><![CDATA[<p>In July famous security researcher Kevin Mitnick passed away.  We briefly pay tribute to Kevin and talk about his contributions to white hat hacking as a practice.</p>
]]></description>
      <pubDate>Mon, 31 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In July famous security researcher Kevin Mitnick passed away.  We briefly pay tribute to Kevin and talk about his contributions to white hat hacking as a practice.</p>
]]></content:encoded>
      <enclosure length="5627180" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7edf310c-976d-4237-b5c1-5a74dcd7d8a6/audio/553c59e6-6f88-4210-992b-724b2c572370/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 322: RIP Kevin Mitnick</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7edf310c-976d-4237-b5c1-5a74dcd7d8a6/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:51</itunes:duration>
      <itunes:summary>In July famous security researcher Kevin Mitnick passed away.  We briefly pay tribute to Kevin and talk about his contributions to white hat hacking as a practice.</itunes:summary>
      <itunes:subtitle>In July famous security researcher Kevin Mitnick passed away.  We briefly pay tribute to Kevin and talk about his contributions to white hat hacking as a practice.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>240</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1575915868</guid>
      <title>Root Causes 321: CABF Moratorium on New Certificate Consumer Members</title>
      <description><![CDATA[<p>The CA/Browser Forum recently passed a temporary moratorium on new members of the Certificate Consumer class.  We explain how Certificate Consumers have been admitted in the past and the pros and cons of creating stricter rules for Certificate Consumers.</p>
]]></description>
      <pubDate>Wed, 26 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CA/Browser Forum recently passed a temporary moratorium on new members of the Certificate Consumer class.  We explain how Certificate Consumers have been admitted in the past and the pros and cons of creating stricter rules for Certificate Consumers.</p>
]]></content:encoded>
      <enclosure length="15017483" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3666642c-4c60-4d1a-9f30-a29001c29f65/audio/db0ab062-e79f-4d7f-a19e-3f65922f987a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 321: CABF Moratorium on New Certificate Consumer Members</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3666642c-4c60-4d1a-9f30-a29001c29f65/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:38</itunes:duration>
      <itunes:summary>The CA/Browser Forum recently passed a temporary moratorium on new members of the Certificate Consumer class.  We explain how Certificate Consumers have been admitted in the past and the pros and cons of creating stricter rules for Certificate Consumers.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum recently passed a temporary moratorium on new members of the Certificate Consumer class.  We explain how Certificate Consumers have been admitted in the past and the pros and cons of creating stricter rules for Certificate Consumers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>239</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1573320337</guid>
      <title>Root Causes 320: Microsoft-signed Root Kit Attack</title>
      <description><![CDATA[<p>A new root kit attack in the wild is code signed by a Microsoft certificate. We explain kernel-level attacks, how powerful they are, and how this attack occurred.</p>
]]></description>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new root kit attack in the wild is code signed by a Microsoft certificate. We explain kernel-level attacks, how powerful they are, and how this attack occurred.</p>
]]></content:encoded>
      <enclosure length="10608189" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e5791de8-48a4-4612-bfe7-4364a7d3d340/audio/fb011bf5-20db-412a-8b42-a2160ea3d900/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 320: Microsoft-signed Root Kit Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e5791de8-48a4-4612-bfe7-4364a7d3d340/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:02</itunes:duration>
      <itunes:summary>A new root kit attack in the wild is code signed by a Microsoft certificate. We explain kernel-level attacks, how powerful they are, and how this attack occurred.</itunes:summary>
      <itunes:subtitle>A new root kit attack in the wild is code signed by a Microsoft certificate. We explain kernel-level attacks, how powerful they are, and how this attack occurred.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>238</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1571229199</guid>
      <title>Root Causes 319: EU Digital Wallets</title>
      <description><![CDATA[<p>A new agreement mandates that European countries will make digital wallets available to their citizens in 2024.  We explain what's coming and some of its implications.</p>
]]></description>
      <pubDate>Fri, 21 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new agreement mandates that European countries will make digital wallets available to their citizens in 2024.  We explain what's coming and some of its implications.</p>
]]></content:encoded>
      <enclosure length="19530342" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cb0eba56-d4ee-43fa-acf8-8922bc460e99/audio/479130bf-60da-4be9-aafd-9232a2b5b675/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 319: EU Digital Wallets</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cb0eba56-d4ee-43fa-acf8-8922bc460e99/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:20</itunes:duration>
      <itunes:summary>A new agreement mandates that European countries will make digital wallets available to their citizens in 2024.  We explain what&apos;s coming and some of its implications.</itunes:summary>
      <itunes:subtitle>A new agreement mandates that European countries will make digital wallets available to their citizens in 2024.  We explain what&apos;s coming and some of its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>237</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1568302042</guid>
      <title>Root Causes 318: What Is ACME Renewal Information (ARI)?</title>
      <description><![CDATA[<p>ACME is a functional and widely supported protocol for certificate provisioning and installation. A new extension to the protocol will help automate renewals.  In this episode we explain ACME Renewal Information (ARI).</p>
]]></description>
      <pubDate>Tue, 18 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>ACME is a functional and widely supported protocol for certificate provisioning and installation. A new extension to the protocol will help automate renewals.  In this episode we explain ACME Renewal Information (ARI).</p>
]]></content:encoded>
      <enclosure length="9738365" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/179ad5e1-af64-467c-bbee-c19f2c7dbb4c/audio/e656b949-c5c2-47d7-938b-ec11a5d162fa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 318: What Is ACME Renewal Information (ARI)?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/179ad5e1-af64-467c-bbee-c19f2c7dbb4c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:08</itunes:duration>
      <itunes:summary>ACME is a functional and widely supported protocol for certificate provisioning and installation. A new extension to the protocol will help automate renewals.  In this episode we explain ACME Renewal Information (ARI).</itunes:summary>
      <itunes:subtitle>ACME is a functional and widely supported protocol for certificate provisioning and installation. A new extension to the protocol will help automate renewals.  In this episode we explain ACME Renewal Information (ARI).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>236</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1564140772</guid>
      <title>Root Causes 317: New Automotive CAN Bus Attacks Demand PKI</title>
      <description><![CDATA[<p>In this episode we describe how physically accessing the CAN bus wires in a modern automobile can allow a thief to take over key fob functionality to unlock the doors, start the engine, and ultimately steal the vehicle.  We explain how PKI can defeat this attack and what is necessary to get there.</p>
]]></description>
      <pubDate>Thu, 13 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe how physically accessing the CAN bus wires in a modern automobile can allow a thief to take over key fob functionality to unlock the doors, start the engine, and ultimately steal the vehicle.  We explain how PKI can defeat this attack and what is necessary to get there.</p>
]]></content:encoded>
      <enclosure length="19534980" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1bb6216-f892-4d05-98c0-774006e17a05/audio/87c79f99-bb56-4a00-8335-4e6e5970e7dc/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 317: New Automotive CAN Bus Attacks Demand PKI</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1bb6216-f892-4d05-98c0-774006e17a05/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:20</itunes:duration>
      <itunes:summary>In this episode we describe how physically accessing the CAN bus wires in a modern automobile can allow a thief to take over key fob functionality to unlock the doors, start the engine, and ultimately steal the vehicle.  We explain how PKI can defeat this attack and what is necessary to get there.</itunes:summary>
      <itunes:subtitle>In this episode we describe how physically accessing the CAN bus wires in a modern automobile can allow a thief to take over key fob functionality to unlock the doors, start the engine, and ultimately steal the vehicle.  We explain how PKI can defeat this attack and what is necessary to get there.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>235</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1561888303</guid>
      <title>Root Causes 316: SquareSpace Acquires Google Domains</title>
      <description><![CDATA[<p>SquareSpace recently acquired Google's domain registry business.  We discuss what this move says about large technology trends.</p>
]]></description>
      <pubDate>Tue, 11 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>SquareSpace recently acquired Google's domain registry business.  We discuss what this move says about large technology trends.</p>
]]></content:encoded>
      <enclosure length="12379419" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a3399012-f30e-46a6-bd6d-383758529de6/audio/16130a6a-6729-4d43-8b19-8ff145d18dcf/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 316: SquareSpace Acquires Google Domains</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a3399012-f30e-46a6-bd6d-383758529de6/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:53</itunes:duration>
      <itunes:summary>SquareSpace recently acquired Google&apos;s domain registry business.  We discuss what this move says about large technology trends.</itunes:summary>
      <itunes:subtitle>SquareSpace recently acquired Google&apos;s domain registry business.  We discuss what this move says about large technology trends.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>234</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1558516069</guid>
      <title>Root Causes 315: Will the SEC Sue SolarWinds Executives?</title>
      <description><![CDATA[<p>The SEC has sent &quot;Wells notices&quot; to two senior executives from SolarWinds, with regard to the 2019 supply chain attack.  In this episode we explain these notices and their implication.</p>
]]></description>
      <pubDate>Fri, 7 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The SEC has sent &quot;Wells notices&quot; to two senior executives from SolarWinds, with regard to the 2019 supply chain attack.  In this episode we explain these notices and their implication.</p>
]]></content:encoded>
      <enclosure length="15046316" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/adf3c9ff-e36b-4f02-bac9-e4d0cede8107/audio/1ef01b36-f00d-4cf2-9cc7-052f1d67b4d4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 315: Will the SEC Sue SolarWinds Executives?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/adf3c9ff-e36b-4f02-bac9-e4d0cede8107/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:39</itunes:duration>
      <itunes:summary>The SEC has sent &quot;Wells notices&quot; to two senior executives from SolarWinds, with regard to the 2019 supply chain attack.  In this episode we explain these notices and their implication.</itunes:summary>
      <itunes:subtitle>The SEC has sent &quot;Wells notices&quot; to two senior executives from SolarWinds, with regard to the 2019 supply chain attack.  In this episode we explain these notices and their implication.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>233</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1556637772</guid>
      <title>Root Causes 314: AI-based Deepfakes in Real Crimes</title>
      <description><![CDATA[<p>We have spoken in previous episodes about the potential for deepfakes in real-world crimes. In this episode we discuss a variety of real-world attacks in which deepfakes have played a role. These include fake kidnapping, &quot;sextortion,&quot; and a range of spear phishing attacks and social media scams.</p>
]]></description>
      <pubDate>Wed, 5 Jul 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We have spoken in previous episodes about the potential for deepfakes in real-world crimes. In this episode we discuss a variety of real-world attacks in which deepfakes have played a role. These include fake kidnapping, &quot;sextortion,&quot; and a range of spear phishing attacks and social media scams.</p>
]]></content:encoded>
      <enclosure length="25222110" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f67415dd-3d30-4c15-b137-9708b079509e/audio/8013081e-9001-4e89-8cff-818bccb639c8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 314: AI-based Deepfakes in Real Crimes</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f67415dd-3d30-4c15-b137-9708b079509e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:15</itunes:duration>
      <itunes:summary>We have spoken in previous episodes about the potential for deepfakes in real-world crimes. In this episode we discuss a variety of real-world attacks in which deepfakes have played a role. These include fake kidnapping, &quot;sextortion,&quot; and a range of spear phishing attacks and social media scams.</itunes:summary>
      <itunes:subtitle>We have spoken in previous episodes about the potential for deepfakes in real-world crimes. In this episode we discuss a variety of real-world attacks in which deepfakes have played a role. These include fake kidnapping, &quot;sextortion,&quot; and a range of spear phishing attacks and social media scams.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>232</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1548273106</guid>
      <title>Root Causes 313: SSL Revocation Reason Codes</title>
      <description><![CDATA[<p>In 2022 Mozilla added a root program requirement that CAs include Reason Codes when revoking public TLS certificates.  In this episode we explain the reason codes, along with some explicitly forbidden reason codes, and go into the backstory behind this requirement.</p>
]]></description>
      <pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In 2022 Mozilla added a root program requirement that CAs include Reason Codes when revoking public TLS certificates.  In this episode we explain the reason codes, along with some explicitly forbidden reason codes, and go into the backstory behind this requirement.</p>
]]></content:encoded>
      <enclosure length="15430132" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/184351c7-95c1-4e17-94e5-89539ea4dbbc/audio/d006cbae-1be3-4b76-89ba-e3dce420d3ce/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 313: SSL Revocation Reason Codes</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/184351c7-95c1-4e17-94e5-89539ea4dbbc/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:03</itunes:duration>
      <itunes:summary>In 2022 Mozilla added a root program requirement that CAs include Reason Codes when revoking public TLS certificates.  In this episode we explain the reason codes, along with some explicitly forbidden reason codes, and go into the backstory behind this requirement.</itunes:summary>
      <itunes:subtitle>In 2022 Mozilla added a root program requirement that CAs include Reason Codes when revoking public TLS certificates.  In this episode we explain the reason codes, along with some explicitly forbidden reason codes, and go into the backstory behind this requirement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>231</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1545549694</guid>
      <title>Root Causes 312: You Shouldn&apos;t Roll Your Own Crypto</title>
      <description><![CDATA[<p>Don't roll your own crypto. In this episode we describe the findings from 2021 research that investigating the root causes of problems in cryptographic systems.  The results may surprise you.</p>
]]></description>
      <pubDate>Tue, 20 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Don't roll your own crypto. In this episode we describe the findings from 2021 research that investigating the root causes of problems in cryptographic systems.  The results may surprise you.</p>
]]></content:encoded>
      <enclosure length="14323229" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a442c34c-b3eb-4c9d-9348-e86214c61fb2/audio/538b89d6-32c6-478f-879c-4da3e9514e4a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 312: You Shouldn&apos;t Roll Your Own Crypto</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a442c34c-b3eb-4c9d-9348-e86214c61fb2/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:54</itunes:duration>
      <itunes:summary>Don&apos;t roll your own crypto. In this episode we describe the findings from 2021 research that investigating the root causes of problems in cryptographic systems.  The results may surprise you.</itunes:summary>
      <itunes:subtitle>Don&apos;t roll your own crypto. In this episode we describe the findings from 2021 research that investigating the root causes of problems in cryptographic systems.  The results may surprise you.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>230</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1542373918</guid>
      <title>Root Causes 311: What Is CCADB?</title>
      <description><![CDATA[<p>We describe CCADB, the Common CA Database. We explain the role of CCADB in the WebPKI and how this role is evolving.</p>
]]></description>
      <pubDate>Fri, 16 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We describe CCADB, the Common CA Database. We explain the role of CCADB in the WebPKI and how this role is evolving.</p>
]]></content:encoded>
      <enclosure length="13340563" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a14ed326-7003-4555-99f2-f5deae9d5e35/audio/4e1234aa-ec50-4435-a4c6-647eb17544a8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 311: What Is CCADB?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a14ed326-7003-4555-99f2-f5deae9d5e35/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:53</itunes:duration>
      <itunes:summary>We describe CCADB, the Common CA Database. We explain the role of CCADB in the WebPKI and how this role is evolving.</itunes:summary>
      <itunes:subtitle>We describe CCADB, the Common CA Database. We explain the role of CCADB in the WebPKI and how this role is evolving.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>229</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1538948491</guid>
      <title>Root Causes 310: Another AI Episode</title>
      <description><![CDATA[<p>In this episode we continue to explore the capabilities of AI to replicate known people in deep fakes with AI-generated content.</p>
]]></description>
      <pubDate>Tue, 13 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we continue to explore the capabilities of AI to replicate known people in deep fakes with AI-generated content.</p>
]]></content:encoded>
      <enclosure length="24233221" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/96ac97a9-3b18-46d9-91ce-d29b5d316384/audio/aee339ec-d499-4796-b68f-c08da16e4016/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 310: Another AI Episode</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/96ac97a9-3b18-46d9-91ce-d29b5d316384/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:14</itunes:duration>
      <itunes:summary>In this episode we continue to explore the capabilities of AI to replicate known people in deep fakes with AI-generated content.</itunes:summary>
      <itunes:subtitle>In this episode we continue to explore the capabilities of AI to replicate known people in deep fakes with AI-generated content.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>228</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1534284790</guid>
      <title>Root Causes 309: What Is Key Attestation for Code Signing?</title>
      <description><![CDATA[<p>On June 1, 2023 new rules for delivery of code signing certificates went into effect, requiring the certificate be delivered by secure HSM. In addition to shipping a token by mail, certificates can be electronically delivered to Subscriber-owned hardware that supports key attestation.  In this episode we explain key attestation, supporting hardware, and the pros and cons of this method.</p>
]]></description>
      <pubDate>Wed, 7 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On June 1, 2023 new rules for delivery of code signing certificates went into effect, requiring the certificate be delivered by secure HSM. In addition to shipping a token by mail, certificates can be electronically delivered to Subscriber-owned hardware that supports key attestation.  In this episode we explain key attestation, supporting hardware, and the pros and cons of this method.</p>
]]></content:encoded>
      <enclosure length="10843416" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b55666cf-5daf-47cd-a6c9-094e4dd53b54/audio/1e4b4fa0-3b8e-42bb-81ba-3c725b1824b3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 309: What Is Key Attestation for Code Signing?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b55666cf-5daf-47cd-a6c9-094e4dd53b54/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:17</itunes:duration>
      <itunes:summary>On June 1, 2023 new rules for delivery of code signing certificates went into effect, requiring the certificate be delivered by secure HSM. In addition to shipping a token by mail, certificates can be electronically delivered to Subscriber-owned hardware that supports key attestation.  In this episode we explain key attestation, supporting hardware, and the pros and cons of this method.</itunes:summary>
      <itunes:subtitle>On June 1, 2023 new rules for delivery of code signing certificates went into effect, requiring the certificate be delivered by secure HSM. In addition to shipping a token by mail, certificates can be electronically delivered to Subscriber-owned hardware that supports key attestation.  In this episode we explain key attestation, supporting hardware, and the pros and cons of this method.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>227</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1531662517</guid>
      <title>Root Causes 308: E-Tugra Root Deprecation</title>
      <description><![CDATA[<p>For the second time in under twelve months, a major browser is deprecating a CA's public trust.  This time it's E-Tugra.  Learn about the concerns raised about this CA, investigation of these concerns, and the ultimate deprecation decision.</p>
]]></description>
      <pubDate>Mon, 5 Jun 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For the second time in under twelve months, a major browser is deprecating a CA's public trust.  This time it's E-Tugra.  Learn about the concerns raised about this CA, investigation of these concerns, and the ultimate deprecation decision.</p>
]]></content:encoded>
      <enclosure length="17250952" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fafc09c9-6b04-452a-a1a3-369e77928d1e/audio/9c1a91f6-78e3-456c-9c9e-596803235756/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 308: E-Tugra Root Deprecation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fafc09c9-6b04-452a-a1a3-369e77928d1e/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:57</itunes:duration>
      <itunes:summary>For the second time in under twelve months, a major browser is deprecating a CA&apos;s public trust.  This time it&apos;s E-Tugra.  Learn about the concerns raised about this CA, investigation of these concerns, and the ultimate deprecation decision.</itunes:summary>
      <itunes:subtitle>For the second time in under twelve months, a major browser is deprecating a CA&apos;s public trust.  This time it&apos;s E-Tugra.  Learn about the concerns raised about this CA, investigation of these concerns, and the ultimate deprecation decision.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>226</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1526999656</guid>
      <title>Root Causes 307: OT Red Teaming Leads to Malware Attack</title>
      <description><![CDATA[<p>In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.</p>
]]></description>
      <pubDate>Wed, 31 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.</p>
]]></content:encoded>
      <enclosure length="13042225" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3b70c6a5-81a2-4ccc-9bf1-3c30526681f4/audio/5a27118b-8bf7-4c23-901d-b3c9f039bd79/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 307: OT Red Teaming Leads to Malware Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3b70c6a5-81a2-4ccc-9bf1-3c30526681f4/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:34</itunes:duration>
      <itunes:summary>In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.</itunes:summary>
      <itunes:subtitle>In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>225</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1523387233</guid>
      <title>Root Causes 306: Certificate Transparency Logs and Privacy</title>
      <description><![CDATA[<p>Certificate Transparency (CT) logs do a lot of good for the WebPKI. They also, however, carry with them some privacy concerns.  In this episode we explain those concerns.</p>
]]></description>
      <pubDate>Fri, 26 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certificate Transparency (CT) logs do a lot of good for the WebPKI. They also, however, carry with them some privacy concerns.  In this episode we explain those concerns.</p>
]]></content:encoded>
      <enclosure length="12912822" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/742a2d83-3e83-4d47-97e2-61edcdef0fa3/audio/d877b15b-4d55-4cd1-acbf-b148b9931531/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 306: Certificate Transparency Logs and Privacy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/742a2d83-3e83-4d47-97e2-61edcdef0fa3/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:26</itunes:duration>
      <itunes:summary>Certificate Transparency (CT) logs do a lot of good for the WebPKI. They also, however, carry with them some privacy concerns.  In this episode we explain those concerns.</itunes:summary>
      <itunes:subtitle>Certificate Transparency (CT) logs do a lot of good for the WebPKI. They also, however, carry with them some privacy concerns.  In this episode we explain those concerns.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>224</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1521513139</guid>
      <title>Root Causes 305: The Fifth Pillar of Certificate Lifecycle Management</title>
      <description><![CDATA[<p>In our episode 143 we introduced the Four Pillars of Certificate Lifecycle Management.  Now, two years later, we introduce a fifth pillar of CLM.</p>
]]></description>
      <pubDate>Mon, 22 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our episode 143 we introduced the Four Pillars of Certificate Lifecycle Management.  Now, two years later, we introduce a fifth pillar of CLM.</p>
]]></content:encoded>
      <enclosure length="13170053" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5084357e-bcb4-4b1f-a31e-1bb4c8fc1df4/audio/42d1ba71-e4c1-4e12-a9fc-805b56440356/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 305: The Fifth Pillar of Certificate Lifecycle Management</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5084357e-bcb4-4b1f-a31e-1bb4c8fc1df4/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:42</itunes:duration>
      <itunes:summary>In our episode 143 we introduced the Four Pillars of Certificate Lifecycle Management.  Now, two years later, we introduce a fifth pillar of CLM.</itunes:summary>
      <itunes:subtitle>In our episode 143 we introduced the Four Pillars of Certificate Lifecycle Management.  Now, two years later, we introduce a fifth pillar of CLM.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>223</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1517870395</guid>
      <title>Root Causes 304: Your 90-day SSL Certificates Checklist</title>
      <description><![CDATA[<p>90-day maximum term for SSL certificates is coming. In this episode expert guest Henry Lam details his four-point checklist for preparing enterprises for these shorter-lived certificates.</p>
]]></description>
      <pubDate>Thu, 18 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>90-day maximum term for SSL certificates is coming. In this episode expert guest Henry Lam details his four-point checklist for preparing enterprises for these shorter-lived certificates.</p>
]]></content:encoded>
      <enclosure length="13193728" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/df4ea804-645c-4f56-8958-8db5f12fa01c/audio/c576b16b-0a82-42c9-8c0d-c17774861432/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 304: Your 90-day SSL Certificates Checklist</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/df4ea804-645c-4f56-8958-8db5f12fa01c/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:44</itunes:duration>
      <itunes:summary>90-day maximum term for SSL certificates is coming. In this episode expert guest Henry Lam details his four-point checklist for preparing enterprises for these shorter-lived certificates.</itunes:summary>
      <itunes:subtitle>90-day maximum term for SSL certificates is coming. In this episode expert guest Henry Lam details his four-point checklist for preparing enterprises for these shorter-lived certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>222</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1515519550</guid>
      <title>Root Causes 303: A Return to Chrome and the Address Bar</title>
      <description><![CDATA[<p>In our recent episode 300 we discussed Chrome's upcoming removal of the lock icon from its interface. In this follow up, we catch the listener up on Chrome's longstanding program to minimize the URL in its interface, even to the point of contemplating removing the address bar entirely.</p>
]]></description>
      <pubDate>Tue, 16 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our recent episode 300 we discussed Chrome's upcoming removal of the lock icon from its interface. In this follow up, we catch the listener up on Chrome's longstanding program to minimize the URL in its interface, even to the point of contemplating removing the address bar entirely.</p>
]]></content:encoded>
      <enclosure length="18397110" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1709a3a9-7a77-4c23-b68a-b45c30a08d70/audio/41e05fd3-c510-4236-aba4-558dd664efec/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 303: A Return to Chrome and the Address Bar</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1709a3a9-7a77-4c23-b68a-b45c30a08d70/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:09</itunes:duration>
      <itunes:summary>In our recent episode 300 we discussed Chrome&apos;s upcoming removal of the lock icon from its interface. In this follow up, we catch the listener up on Chrome&apos;s longstanding program to minimize the URL in its interface, even to the point of contemplating removing the address bar entirely.</itunes:summary>
      <itunes:subtitle>In our recent episode 300 we discussed Chrome&apos;s upcoming removal of the lock icon from its interface. In this follow up, we catch the listener up on Chrome&apos;s longstanding program to minimize the URL in its interface, even to the point of contemplating removing the address bar entirely.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>221</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1513014721</guid>
      <title>Root Causes 302: Intel Secure Boot Private Key Leak</title>
      <description><![CDATA[<p>Resulting from a recent ransomware attack, a private key from Intel has been exposed, affecting more than a hundred OEM components and an unknown number of end user products. We explain what happened and its possible implications.</p>
]]></description>
      <pubDate>Fri, 12 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Resulting from a recent ransomware attack, a private key from Intel has been exposed, affecting more than a hundred OEM components and an unknown number of end user products. We explain what happened and its possible implications.</p>
]]></content:encoded>
      <enclosure length="12046134" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/927ad2b0-53a2-4079-a979-a1ffd760e113/audio/7de5e618-d417-4770-9b3b-a09ef2cb6a8e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 302: Intel Secure Boot Private Key Leak</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/927ad2b0-53a2-4079-a979-a1ffd760e113/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:32</itunes:duration>
      <itunes:summary>Resulting from a recent ransomware attack, a private key from Intel has been exposed, affecting more than a hundred OEM components and an unknown number of end user products. We explain what happened and its possible implications.</itunes:summary>
      <itunes:subtitle>Resulting from a recent ransomware attack, a private key from Intel has been exposed, affecting more than a hundred OEM components and an unknown number of end user products. We explain what happened and its possible implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>220</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1510343599</guid>
      <title>Root Causes 301: The Difference Between Certificate Automation and CLM</title>
      <description><![CDATA[<p>This podcast frequently discusses the concepts of certificate automation and Certificate Lifecycle Management (CLM).  In this episode we discuss how CLM does not always entail automation and vice versa -- along with where this distinction occurs and why it matters.</p>
]]></description>
      <pubDate>Tue, 9 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>This podcast frequently discusses the concepts of certificate automation and Certificate Lifecycle Management (CLM).  In this episode we discuss how CLM does not always entail automation and vice versa -- along with where this distinction occurs and why it matters.</p>
]]></content:encoded>
      <enclosure length="14334561" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ec1dd79-594d-4616-b5a5-a2e36c19b8c2/audio/d4c99f3e-3076-4ba2-96e8-9a2b434e907b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 301: The Difference Between Certificate Automation and CLM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ec1dd79-594d-4616-b5a5-a2e36c19b8c2/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:55</itunes:duration>
      <itunes:summary>This podcast frequently discusses the concepts of certificate automation and Certificate Lifecycle Management (CLM).  In this episode we discuss how CLM does not always entail automation and vice versa -- along with where this distinction occurs and why it matters.</itunes:summary>
      <itunes:subtitle>This podcast frequently discusses the concepts of certificate automation and Certificate Lifecycle Management (CLM).  In this episode we discuss how CLM does not always entail automation and vice versa -- along with where this distinction occurs and why it matters.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>219</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1507288045</guid>
      <title>Root Causes 300: Chrome Eliminates the Lock Icon</title>
      <description><![CDATA[<p>Google Chrome has announced that it will eliminate the lock icon in September. We explain what Google will be doing, its stated rationale, and the pros and cons of this decision.</p>
]]></description>
      <pubDate>Thu, 4 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Google Chrome has announced that it will eliminate the lock icon in September. We explain what Google will be doing, its stated rationale, and the pros and cons of this decision.</p>
]]></content:encoded>
      <enclosure length="17922166" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/30ad581f-5fe8-474b-8aef-49467944d680/audio/fd47974d-d617-4907-9b88-2553cda3eaf0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 300: Chrome Eliminates the Lock Icon</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/30ad581f-5fe8-474b-8aef-49467944d680/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:39</itunes:duration>
      <itunes:summary>Google Chrome has announced that it will eliminate the lock icon in September. We explain what Google will be doing, its stated rationale, and the pros and cons of this decision.</itunes:summary>
      <itunes:subtitle>Google Chrome has announced that it will eliminate the lock icon in September. We explain what Google will be doing, its stated rationale, and the pros and cons of this decision.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>218</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1504926001</guid>
      <title>Root Causes 299: 2023 RSA Recap</title>
      <description><![CDATA[<p>The 2023 RSA Conference just concluded.  This week Tim recaps what he saw at the show and how it reflects on security industry trends. Our hosts discuss Zero Trust, PQC, blockchain, artificial intelligence, post-COVID tradeshow behavior, and more.</p>
]]></description>
      <pubDate>Tue, 2 May 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The 2023 RSA Conference just concluded.  This week Tim recaps what he saw at the show and how it reflects on security industry trends. Our hosts discuss Zero Trust, PQC, blockchain, artificial intelligence, post-COVID tradeshow behavior, and more.</p>
]]></content:encoded>
      <enclosure length="29894405" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8a03b06c-5f2e-4894-8bd5-057826fe4109/audio/b8d95d2a-2250-4e99-af04-f9affdc464af/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 299: 2023 RSA Recap</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8a03b06c-5f2e-4894-8bd5-057826fe4109/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:07</itunes:duration>
      <itunes:summary>The 2023 RSA Conference just concluded.  This week Tim recaps what he saw at the show and how it reflects on security industry trends. Our hosts discuss Zero Trust, PQC, blockchain, artificial intelligence, post-COVID tradeshow behavior, and more.</itunes:summary>
      <itunes:subtitle>The 2023 RSA Conference just concluded.  This week Tim recaps what he saw at the show and how it reflects on security industry trends. Our hosts discuss Zero Trust, PQC, blockchain, artificial intelligence, post-COVID tradeshow behavior, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>217</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1502395072</guid>
      <title>Root Causes 298: Moving Forward, Together - Promoting Automation</title>
      <description><![CDATA[<p>The Google Chrome root store has communicated its plans for promoting automation.  In this episode we explain Chrome's public plans for this initiative, which is anchored around ACME.</p>
]]></description>
      <pubDate>Fri, 28 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The Google Chrome root store has communicated its plans for promoting automation.  In this episode we explain Chrome's public plans for this initiative, which is anchored around ACME.</p>
]]></content:encoded>
      <enclosure length="11978507" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/78d85830-cba1-469e-b4f1-989394e1092a/audio/f67d4e44-8896-4ecb-ab9a-1ae028472c74/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 298: Moving Forward, Together - Promoting Automation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/78d85830-cba1-469e-b4f1-989394e1092a/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:28</itunes:duration>
      <itunes:summary>The Google Chrome root store has communicated its plans for promoting automation.  In this episode we explain Chrome&apos;s public plans for this initiative, which is anchored around ACME.</itunes:summary>
      <itunes:subtitle>The Google Chrome root store has communicated its plans for promoting automation.  In this episode we explain Chrome&apos;s public plans for this initiative, which is anchored around ACME.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>216</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1500747997</guid>
      <title>Root Causes 297: Certificate Expiration Creates Starlink Outage</title>
      <description><![CDATA[<p>A recent outage in the Starlink internet service was caused by an unexpected certificate expiration. We discuss this ongoing problem and how 90-day maximum certificate term will exacerbate it.</p>
]]></description>
      <pubDate>Wed, 26 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent outage in the Starlink internet service was caused by an unexpected certificate expiration. We discuss this ongoing problem and how 90-day maximum certificate term will exacerbate it.</p>
]]></content:encoded>
      <enclosure length="9555851" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/297f49fc-994c-4a54-951c-467957d1e2f8/audio/39722946-e940-44d5-ab5e-059c8f1be9c7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 297: Certificate Expiration Creates Starlink Outage</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/297f49fc-994c-4a54-951c-467957d1e2f8/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:56</itunes:duration>
      <itunes:summary>A recent outage in the Starlink internet service was caused by an unexpected certificate expiration. We discuss this ongoing problem and how 90-day maximum certificate term will exacerbate it.</itunes:summary>
      <itunes:subtitle>A recent outage in the Starlink internet service was caused by an unexpected certificate expiration. We discuss this ongoing problem and how 90-day maximum certificate term will exacerbate it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>215</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1497807655</guid>
      <title>Root Causes 296: SHOULD We or MUST We?</title>
      <description><![CDATA[<p>The CA/Browser Forum guidelines contain many prescribed requirements, with language containing the word SHOULD or MUST. In this episode we explain the specifying power of these two words, why they are used, and what they signal about the intent behind a guideline and how the rules might evolve.</p>
]]></description>
      <pubDate>Fri, 21 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CA/Browser Forum guidelines contain many prescribed requirements, with language containing the word SHOULD or MUST. In this episode we explain the specifying power of these two words, why they are used, and what they signal about the intent behind a guideline and how the rules might evolve.</p>
]]></content:encoded>
      <enclosure length="12124428" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3e322424-07fd-4153-9666-7596cef8a152/audio/e5198d82-42de-47e8-bca1-558dae39ae07/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 296: SHOULD We or MUST We?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3e322424-07fd-4153-9666-7596cef8a152/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:37</itunes:duration>
      <itunes:summary>The CA/Browser Forum guidelines contain many prescribed requirements, with language containing the word SHOULD or MUST. In this episode we explain the specifying power of these two words, why they are used, and what they signal about the intent behind a guideline and how the rules might evolve.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum guidelines contain many prescribed requirements, with language containing the word SHOULD or MUST. In this episode we explain the specifying power of these two words, why they are used, and what they signal about the intent behind a guideline and how the rules might evolve.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>214</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1494911086</guid>
      <title>Root Causes 295: Genesis Criminal Marketplace Taken Down</title>
      <description><![CDATA[<p>A large, public criminal marketplace for stolen logins and other information was rolled up by law enforcement across seventeen countries. Genesis Marketplace offered not only traditional login credentials but also associated data needed to defeat MFA.</p>
]]></description>
      <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A large, public criminal marketplace for stolen logins and other information was rolled up by law enforcement across seventeen countries. Genesis Marketplace offered not only traditional login credentials but also associated data needed to defeat MFA.</p>
]]></content:encoded>
      <enclosure length="10647577" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a0006ada-20a7-450c-af3c-764ecb1756ca/audio/04a90cc1-8df0-4125-8e5e-23b7021cc7e0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 295: Genesis Criminal Marketplace Taken Down</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a0006ada-20a7-450c-af3c-764ecb1756ca/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:04</itunes:duration>
      <itunes:summary>A large, public criminal marketplace for stolen logins and other information was rolled up by law enforcement across seventeen countries. Genesis Marketplace offered not only traditional login credentials but also associated data needed to defeat MFA.</itunes:summary>
      <itunes:subtitle>A large, public criminal marketplace for stolen logins and other information was rolled up by law enforcement across seventeen countries. Genesis Marketplace offered not only traditional login credentials but also associated data needed to defeat MFA.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>213</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1491689812</guid>
      <title>Root Causes 294: Root Causes Honored by Webby Awards</title>
      <description><![CDATA[<p>The Root Causes podcast has received a Webby Honoree award.  Jason and Tim briefly celebrate and discuss the challenge of operating a niche, homemade podcast while being directly compared to professionally produced podcasts on mainstream topics from media companies. Plus, Tim's new Root Causes t-shirt.</p>
]]></description>
      <pubDate>Thu, 13 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The Root Causes podcast has received a Webby Honoree award.  Jason and Tim briefly celebrate and discuss the challenge of operating a niche, homemade podcast while being directly compared to professionally produced podcasts on mainstream topics from media companies. Plus, Tim's new Root Causes t-shirt.</p>
]]></content:encoded>
      <enclosure length="8802472" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d18f03da-3179-4715-bbcc-9f879aaceb65/audio/f78cb49f-854b-4e99-b3c0-7f5ef7b68351/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 294: Root Causes Honored by Webby Awards</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d18f03da-3179-4715-bbcc-9f879aaceb65/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:09</itunes:duration>
      <itunes:summary>The Root Causes podcast has received a Webby Honoree award.  Jason and Tim briefly celebrate and discuss the challenge of operating a niche, homemade podcast while being directly compared to professionally produced podcasts on mainstream topics from media companies. Plus, Tim&apos;s new Root Causes t-shirt.</itunes:summary>
      <itunes:subtitle>The Root Causes podcast has received a Webby Honoree award.  Jason and Tim briefly celebrate and discuss the challenge of operating a niche, homemade podcast while being directly compared to professionally produced podcasts on mainstream topics from media companies. Plus, Tim&apos;s new Root Causes t-shirt.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>212</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1489207144</guid>
      <title>Root Causes 293: What Is Certbot?</title>
      <description><![CDATA[<p>Certbot is an important part of the ACME standard.  This open source tool makes it easier for many IT administrators to use ACME to automate provisioning and installation of SSL / TLS certificates.</p>
]]></description>
      <pubDate>Mon, 10 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certbot is an important part of the ACME standard.  This open source tool makes it easier for many IT administrators to use ACME to automate provisioning and installation of SSL / TLS certificates.</p>
]]></content:encoded>
      <enclosure length="12054426" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/624332ea-9268-48b8-a035-34aa76229c5f/audio/a1261aeb-d8d2-4158-be2c-af2fd878a4aa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 293: What Is Certbot?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/624332ea-9268-48b8-a035-34aa76229c5f/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:32</itunes:duration>
      <itunes:summary>Certbot is an important part of the ACME standard.  This open source tool makes it easier for many IT administrators to use ACME to automate provisioning and installation of SSL / TLS certificates.</itunes:summary>
      <itunes:subtitle>Certbot is an important part of the ACME standard.  This open source tool makes it easier for many IT administrators to use ACME to automate provisioning and installation of SSL / TLS certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>211</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1486921291</guid>
      <title>Root Causes 292: Validation Data Reuse for 90-day Certificates</title>
      <description><![CDATA[<p>As the industry explores the expected consequences of 90-day maximum term for SSL / TLS certificates, some are wondering if the allowed validation data reuse period stands to go down also.  We explain today's data reuse rules and what the evidence indicates will be required for both domain control validation (DCV) and organization information validation.</p>
]]></description>
      <pubDate>Thu, 6 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As the industry explores the expected consequences of 90-day maximum term for SSL / TLS certificates, some are wondering if the allowed validation data reuse period stands to go down also.  We explain today's data reuse rules and what the evidence indicates will be required for both domain control validation (DCV) and organization information validation.</p>
]]></content:encoded>
      <enclosure length="14728014" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5d065b4b-6906-4594-828c-ccd71bfca905/audio/74d1c23a-fdcb-4a02-b980-5bfda3d0e8cd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 292: Validation Data Reuse for 90-day Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5d065b4b-6906-4594-828c-ccd71bfca905/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:20</itunes:duration>
      <itunes:summary>As the industry explores the expected consequences of 90-day maximum term for SSL / TLS certificates, some are wondering if the allowed validation data reuse period stands to go down also.  We explain today&apos;s data reuse rules and what the evidence indicates will be required for both domain control validation (DCV) and organization information validation.</itunes:summary>
      <itunes:subtitle>As the industry explores the expected consequences of 90-day maximum term for SSL / TLS certificates, some are wondering if the allowed validation data reuse period stands to go down also.  We explain today&apos;s data reuse rules and what the evidence indicates will be required for both domain control validation (DCV) and organization information validation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>210</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1484037643</guid>
      <title>Root Causes 291: CLM and SIEM</title>
      <description><![CDATA[<p>We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.</p>
]]></description>
      <pubDate>Mon, 3 Apr 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.</p>
]]></content:encoded>
      <enclosure length="9274054" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f4bc6e34-8d3d-4ae2-90d8-3735da01c929/audio/86c50724-8c88-4c10-ab6e-243d2c150a4f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 291: CLM and SIEM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f4bc6e34-8d3d-4ae2-90d8-3735da01c929/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:39</itunes:duration>
      <itunes:summary>We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.</itunes:summary>
      <itunes:subtitle>We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>209</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1481509357</guid>
      <title>Root Causes 290: What Are QGIS and QIIS?</title>
      <description><![CDATA[<p>In this episode we define Qualified Government Information Source (QGIS) and Qualified Independent Information Source (QIIS), which are critical to CABF-compliant organization validation.  We explain how they fit into validation and the criteria for a reliable information source.</p>
]]></description>
      <pubDate>Wed, 29 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we define Qualified Government Information Source (QGIS) and Qualified Independent Information Source (QIIS), which are critical to CABF-compliant organization validation.  We explain how they fit into validation and the criteria for a reliable information source.</p>
]]></content:encoded>
      <enclosure length="12580248" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/010c8730-6df6-451f-b337-04c8bd4c67c8/audio/15324c4b-df43-4e7f-9d25-c2d56f04e2ea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 290: What Are QGIS and QIIS?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/010c8730-6df6-451f-b337-04c8bd4c67c8/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:05</itunes:duration>
      <itunes:summary>In this episode we define Qualified Government Information Source (QGIS) and Qualified Independent Information Source (QIIS), which are critical to CABF-compliant organization validation.  We explain how they fit into validation and the criteria for a reliable information source.</itunes:summary>
      <itunes:subtitle>In this episode we define Qualified Government Information Source (QGIS) and Qualified Independent Information Source (QIIS), which are critical to CABF-compliant organization validation.  We explain how they fit into validation and the criteria for a reliable information source.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>208</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1478675155</guid>
      <title>Root Causes 289: What Is a Cryptographic Center of Excellence?</title>
      <description><![CDATA[<p>In this episode we dig into an emerging idea, which is the cryptographic center of excellence.  We discuss how such a center of excellence would work and the benefits it can bring to an enterprise.</p>
]]></description>
      <pubDate>Mon, 27 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we dig into an emerging idea, which is the cryptographic center of excellence.  We discuss how such a center of excellence would work and the benefits it can bring to an enterprise.</p>
]]></content:encoded>
      <enclosure length="8167750" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b4539f67-93b1-48d6-aa6b-14fb6e0a5c98/audio/c14891c8-1a85-4dc0-aa21-b6fa4d1c38db/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 289: What Is a Cryptographic Center of Excellence?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b4539f67-93b1-48d6-aa6b-14fb6e0a5c98/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:30</itunes:duration>
      <itunes:summary>In this episode we dig into an emerging idea, which is the cryptographic center of excellence.  We discuss how such a center of excellence would work and the benefits it can bring to an enterprise.</itunes:summary>
      <itunes:subtitle>In this episode we dig into an emerging idea, which is the cryptographic center of excellence.  We discuss how such a center of excellence would work and the benefits it can bring to an enterprise.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>207</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1475542822</guid>
      <title>Root Causes 288: ISARA Releases Patents on Hybrid Certificates</title>
      <description><![CDATA[<p>In this episode we are joined by Atsushi Yamada, CEO of ISARA.  He explains how ISARA has put its patents on hybrid certificates into the public domain and why.  We explain the role of hybrid certificates in PQC and ongoing crypto agility.</p>
]]></description>
      <pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we are joined by Atsushi Yamada, CEO of ISARA.  He explains how ISARA has put its patents on hybrid certificates into the public domain and why.  We explain the role of hybrid certificates in PQC and ongoing crypto agility.</p>
]]></content:encoded>
      <enclosure length="11838736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/705a37cf-408a-4db3-873a-77c147de3c77/audio/0bf70aca-d858-4db0-97c5-350d2c1b6821/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 288: ISARA Releases Patents on Hybrid Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/705a37cf-408a-4db3-873a-77c147de3c77/3000x3000/artworks-upexg1rf5avle3gf-gn3z0a-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:19</itunes:duration>
      <itunes:summary>In this episode we are joined by Atsushi Yamada, CEO of ISARA.  He explains how ISARA has put its patents on hybrid certificates into the public domain and why.  We explain the role of hybrid certificates in PQC and ongoing crypto agility.</itunes:summary>
      <itunes:subtitle>In this episode we are joined by Atsushi Yamada, CEO of ISARA.  He explains how ISARA has put its patents on hybrid certificates into the public domain and why.  We explain the role of hybrid certificates in PQC and ongoing crypto agility.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>206</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1473894910</guid>
      <title>Root Causes 287: GoDaddy Private Key Breach</title>
      <description><![CDATA[<p>In this episode we describe an incident in which a GoDaddy breach exposed customer private keys.  We explain the expectations surrounding private key exposure and get into the interesting question of when an incident is or is not part of a large company's CA business.</p>
]]></description>
      <pubDate>Mon, 20 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe an incident in which a GoDaddy breach exposed customer private keys.  We explain the expectations surrounding private key exposure and get into the interesting question of when an incident is or is not part of a large company's CA business.</p>
]]></content:encoded>
      <enclosure length="13244965" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fec1d285-1120-4c9e-9338-394a840d34c6/audio/460a9ea0-139b-4e5c-97f4-7325e10a1d66/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 287: GoDaddy Private Key Breach</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fec1d285-1120-4c9e-9338-394a840d34c6/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:47</itunes:duration>
      <itunes:summary>In this episode we describe an incident in which a GoDaddy breach exposed customer private keys.  We explain the expectations surrounding private key exposure and get into the interesting question of when an incident is or is not part of a large company&apos;s CA business.</itunes:summary>
      <itunes:subtitle>In this episode we describe an incident in which a GoDaddy breach exposed customer private keys.  We explain the expectations surrounding private key exposure and get into the interesting question of when an incident is or is not part of a large company&apos;s CA business.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>205</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1470216301</guid>
      <title>Root Causes 286: PKI and PQC in New White House Cybersecurity Initiative</title>
      <description><![CDATA[<p>A new White House cybersecurity initiative specifically calls out digital identity and post quantum cryptography (PQC) among its focal areas. We discuss what it says and the potential implications.</p>
]]></description>
      <pubDate>Thu, 16 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new White House cybersecurity initiative specifically calls out digital identity and post quantum cryptography (PQC) among its focal areas. We discuss what it says and the potential implications.</p>
]]></content:encoded>
      <enclosure length="9678355" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/93747ba3-31a6-4966-ac30-fe3681e9128d/audio/e8996301-4c21-4cdf-aed1-121f898d4800/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 286: PKI and PQC in New White House Cybersecurity Initiative</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/93747ba3-31a6-4966-ac30-fe3681e9128d/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:04</itunes:duration>
      <itunes:summary>A new White House cybersecurity initiative specifically calls out digital identity and post quantum cryptography (PQC) among its focal areas. We discuss what it says and the potential implications.</itunes:summary>
      <itunes:subtitle>A new White House cybersecurity initiative specifically calls out digital identity and post quantum cryptography (PQC) among its focal areas. We discuss what it says and the potential implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>204</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1468666618</guid>
      <title>Root Causes 285: Can ChatGPT Write Malware?</title>
      <description><![CDATA[<p>In our ongoing exploration of the security implications of AI, in this episode we examine the suitability of ChatGPT as a malware-writing tool and possible future directions for AI in software creation.</p>
]]></description>
      <pubDate>Tue, 14 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing exploration of the security implications of AI, in this episode we examine the suitability of ChatGPT as a malware-writing tool and possible future directions for AI in software creation.</p>
]]></content:encoded>
      <enclosure length="15518777" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/63e3a86c-fedf-4032-8348-fc7b988ff1c3/audio/b8921230-33e5-4748-a4c0-8e63cce74ece/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 285: Can ChatGPT Write Malware?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/63e3a86c-fedf-4032-8348-fc7b988ff1c3/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:09</itunes:duration>
      <itunes:summary>In our ongoing exploration of the security implications of AI, in this episode we examine the suitability of ChatGPT as a malware-writing tool and possible future directions for AI in software creation.</itunes:summary>
      <itunes:subtitle>In our ongoing exploration of the security implications of AI, in this episode we examine the suitability of ChatGPT as a malware-writing tool and possible future directions for AI in software creation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>203</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1466102515</guid>
      <title>Root Causes 284: 90-day SSL Certificates Are on the Way</title>
      <description><![CDATA[<p>The Google Chrome root program recently announced its intention to reduce the maximum term for public SSL certificates to 90 days.  In this episode we explain this announcement and its implications and speculate on timing for this reduction.</p>
]]></description>
      <pubDate>Fri, 10 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The Google Chrome root program recently announced its intention to reduce the maximum term for public SSL certificates to 90 days.  In this episode we explain this announcement and its implications and speculate on timing for this reduction.</p>
]]></content:encoded>
      <enclosure length="22950181" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8d18bf24-33c3-4623-8692-b14bff2b12ea/audio/f0c9c8ad-d68e-444f-aec1-275ab5d443fc/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 284: 90-day SSL Certificates Are on the Way</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8d18bf24-33c3-4623-8692-b14bff2b12ea/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:54</itunes:duration>
      <itunes:summary>The Google Chrome root program recently announced its intention to reduce the maximum term for public SSL certificates to 90 days.  In this episode we explain this announcement and its implications and speculate on timing for this reduction.</itunes:summary>
      <itunes:subtitle>The Google Chrome root program recently announced its intention to reduce the maximum term for public SSL certificates to 90 days.  In this episode we explain this announcement and its implications and speculate on timing for this reduction.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>202</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1462715416</guid>
      <title>Root Causes 283: Google Optional OCSP Proposal Clarified</title>
      <description><![CDATA[<p>In our episode 281 we reported on Google's proposal for optional OCSP. In this episode we correct some of our earlier reporting in that episode, including the use of CRL and the removal of any revocation requirement for SSL certificates of not more than ten days in term.</p>
]]></description>
      <pubDate>Mon, 6 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our episode 281 we reported on Google's proposal for optional OCSP. In this episode we correct some of our earlier reporting in that episode, including the use of CRL and the removal of any revocation requirement for SSL certificates of not more than ten days in term.</p>
]]></content:encoded>
      <enclosure length="10858822" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1417d883-f6c9-4f88-9b93-e7ac49c3bffe/audio/9e5b0c3a-05fc-4193-a040-77a776fd2cc8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 283: Google Optional OCSP Proposal Clarified</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1417d883-f6c9-4f88-9b93-e7ac49c3bffe/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:18</itunes:duration>
      <itunes:summary>In our episode 281 we reported on Google&apos;s proposal for optional OCSP. In this episode we correct some of our earlier reporting in that episode, including the use of CRL and the removal of any revocation requirement for SSL certificates of not more than ten days in term.</itunes:summary>
      <itunes:subtitle>In our episode 281 we reported on Google&apos;s proposal for optional OCSP. In this episode we correct some of our earlier reporting in that episode, including the use of CRL and the removal of any revocation requirement for SSL certificates of not more than ten days in term.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>201</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1459740211</guid>
      <title>Root Causes 282: HSMs and Post Quantum Cryptography</title>
      <description><![CDATA[<p>Repeat guest Bruno Couillard of Crypto4A joins us to explain where Hardware Secure Modules (HSMs) fit into the world of PQC. We discuss the issues surrounding how HSMs will work with post quantum algorithms and hybrid certificates and the process (and timelines) for defining how HSMs will incorporate PQC.</p>
]]></description>
      <pubDate>Thu, 2 Mar 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Repeat guest Bruno Couillard of Crypto4A joins us to explain where Hardware Secure Modules (HSMs) fit into the world of PQC. We discuss the issues surrounding how HSMs will work with post quantum algorithms and hybrid certificates and the process (and timelines) for defining how HSMs will incorporate PQC.</p>
]]></content:encoded>
      <enclosure length="27470274" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/24af4197-b92c-4b5d-8858-45f5c0713c2f/audio/78c588a4-8351-474f-a094-30e6b350e4ce/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 282: HSMs and Post Quantum Cryptography</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/24af4197-b92c-4b5d-8858-45f5c0713c2f/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:36</itunes:duration>
      <itunes:summary>Repeat guest Bruno Couillard of Crypto4A joins us to explain where Hardware Secure Modules (HSMs) fit into the world of PQC. We discuss the issues surrounding how HSMs will work with post quantum algorithms and hybrid certificates and the process (and timelines) for defining how HSMs will incorporate PQC.</itunes:summary>
      <itunes:subtitle>Repeat guest Bruno Couillard of Crypto4A joins us to explain where Hardware Secure Modules (HSMs) fit into the world of PQC. We discuss the issues surrounding how HSMs will work with post quantum algorithms and hybrid certificates and the process (and timelines) for defining how HSMs will incorporate PQC.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>200</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1457069434</guid>
      <title>Root Causes 281: Google Proposes Optional OCSP</title>
      <description><![CDATA[<p>In response to concerns about OCSP and privacy, Google has proposed removing the requirement for OCSP revocation checking for public SSL certificates meeting certain specific conditions.  In this episode we go into the details of this proposal.</p>
]]></description>
      <pubDate>Sun, 26 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In response to concerns about OCSP and privacy, Google has proposed removing the requirement for OCSP revocation checking for public SSL certificates meeting certain specific conditions.  In this episode we go into the details of this proposal.</p>
]]></content:encoded>
      <enclosure length="25322131" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/39574469-622e-418f-978d-b106567f752a/audio/00b30085-93d6-4dfd-b493-c1ae0d6627c3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 281: Google Proposes Optional OCSP</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/39574469-622e-418f-978d-b106567f752a/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:22</itunes:duration>
      <itunes:summary>In response to concerns about OCSP and privacy, Google has proposed removing the requirement for OCSP revocation checking for public SSL certificates meeting certain specific conditions.  In this episode we go into the details of this proposal.</itunes:summary>
      <itunes:subtitle>In response to concerns about OCSP and privacy, Google has proposed removing the requirement for OCSP revocation checking for public SSL certificates meeting certain specific conditions.  In this episode we go into the details of this proposal.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>199</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1455102184</guid>
      <title>Root Causes 280: Did an AI Break CRYSTALS-Kyber?</title>
      <description><![CDATA[<p>Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm.  In this episode we clarify that Kyber has not been defeated to date and exactly what did occur. We define side channel attack, discuss the broader implications of this attack, and speculate on what would happen if Kyber actually were broken.</p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm.  In this episode we clarify that Kyber has not been defeated to date and exactly what did occur. We define side channel attack, discuss the broader implications of this attack, and speculate on what would happen if Kyber actually were broken.</p>
]]></content:encoded>
      <enclosure length="19344454" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/739ef413-e0f1-497a-9568-016052d32cd6/audio/51de55e1-3cbd-448c-a7c2-96e58ca21cb3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 280: Did an AI Break CRYSTALS-Kyber?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/739ef413-e0f1-497a-9568-016052d32cd6/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:08</itunes:duration>
      <itunes:summary>Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm.  In this episode we clarify that Kyber has not been defeated to date and exactly what did occur. We define side channel attack, discuss the broader implications of this attack, and speculate on what would happen if Kyber actually were broken.</itunes:summary>
      <itunes:subtitle>Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm.  In this episode we clarify that Kyber has not been defeated to date and exactly what did occur. We define side channel attack, discuss the broader implications of this attack, and speculate on what would happen if Kyber actually were broken.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>198</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1451544178</guid>
      <title>Root Causes 279: ChatGPT Watermarking</title>
      <description><![CDATA[<p>ChatGPT presents the potential problem of ChatGPT content being used and attributed to another source, such as a professional writer or a student. In this episode we discuss the idea of &quot;watermarking&quot; ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.</p>
]]></description>
      <pubDate>Sun, 19 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>ChatGPT presents the potential problem of ChatGPT content being used and attributed to another source, such as a professional writer or a student. In this episode we discuss the idea of &quot;watermarking&quot; ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.</p>
]]></content:encoded>
      <enclosure length="15282993" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b9128637-764b-41ce-b52a-01a630421b39/audio/6e6f2394-b266-4581-83be-7105c2beb496/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 279: ChatGPT Watermarking</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b9128637-764b-41ce-b52a-01a630421b39/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:54</itunes:duration>
      <itunes:summary>ChatGPT presents the potential problem of ChatGPT content being used and attributed to another source, such as a professional writer or a student. In this episode we discuss the idea of &quot;watermarking&quot; ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.</itunes:summary>
      <itunes:subtitle>ChatGPT presents the potential problem of ChatGPT content being used and attributed to another source, such as a professional writer or a student. In this episode we discuss the idea of &quot;watermarking&quot; ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>197</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1449414250</guid>
      <title>Root Causes 278: Microsoft on Certificates and FIDO</title>
      <description><![CDATA[<p>Recent public discussion of FIDO and digital certificates reveal details of Microsoft's approach to consumer digital authentication.  We discuss secure elements, Windows Hello, and the differences between B2C, B2B, and B2E.</p>
]]></description>
      <pubDate>Fri, 17 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent public discussion of FIDO and digital certificates reveal details of Microsoft's approach to consumer digital authentication.  We discuss secure elements, Windows Hello, and the differences between B2C, B2B, and B2E.</p>
]]></content:encoded>
      <enclosure length="10843847" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a6f737ca-fa27-44a1-989d-434d8636c29c/audio/c81f5fb8-5505-4b5c-834e-475c9776748e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 278: Microsoft on Certificates and FIDO</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a6f737ca-fa27-44a1-989d-434d8636c29c/3000x3000/artworks-pc9yyfjlrpzqfoxa-29zvxq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:17</itunes:duration>
      <itunes:summary>Recent public discussion of FIDO and digital certificates reveal details of Microsoft&apos;s approach to consumer digital authentication.  We discuss secure elements, Windows Hello, and the differences between B2C, B2B, and B2E.</itunes:summary>
      <itunes:subtitle>Recent public discussion of FIDO and digital certificates reveal details of Microsoft&apos;s approach to consumer digital authentication.  We discuss secure elements, Windows Hello, and the differences between B2C, B2B, and B2E.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>196</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1446183160</guid>
      <title>Root Causes 277: Privacy Sandbox</title>
      <description><![CDATA[<p>In the latest continuation of the effort to create better protections for consumer privacy while still enabling targeted advertising, Google has announced the Privacy Sandbox.  In this episode we describe this latest foray, including concepts like k-anonymity and differential privacy.</p>
]]></description>
      <pubDate>Mon, 13 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the latest continuation of the effort to create better protections for consumer privacy while still enabling targeted advertising, Google has announced the Privacy Sandbox.  In this episode we describe this latest foray, including concepts like k-anonymity and differential privacy.</p>
]]></content:encoded>
      <enclosure length="14618991" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8456e7d9-f49c-4f6e-96dc-35c462ce8825/audio/a3df105d-e0d5-46d8-8201-e3cad5577e02/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 277: Privacy Sandbox</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8456e7d9-f49c-4f6e-96dc-35c462ce8825/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:13</itunes:duration>
      <itunes:summary>In the latest continuation of the effort to create better protections for consumer privacy while still enabling targeted advertising, Google has announced the Privacy Sandbox.  In this episode we describe this latest foray, including concepts like k-anonymity and differential privacy.</itunes:summary>
      <itunes:subtitle>In the latest continuation of the effort to create better protections for consumer privacy while still enabling targeted advertising, Google has announced the Privacy Sandbox.  In this episode we describe this latest foray, including concepts like k-anonymity and differential privacy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>195</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1443348508</guid>
      <title>Root Causes 276: ChatGPT and Identity Reputation</title>
      <description><![CDATA[<p>ChatGPT and similar AI tools are dominating the public's mind these days.  In this episode we discuss the potential for people to attempt to use ChatGPT as a source of reputational analysis, KYC, and other information about individuals, companies, and other entities.  These activities are potentially subject to both error and deliberate misdirection.  In this episode we explain why.</p>
]]></description>
      <pubDate>Thu, 9 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>ChatGPT and similar AI tools are dominating the public's mind these days.  In this episode we discuss the potential for people to attempt to use ChatGPT as a source of reputational analysis, KYC, and other information about individuals, companies, and other entities.  These activities are potentially subject to both error and deliberate misdirection.  In this episode we explain why.</p>
]]></content:encoded>
      <enclosure length="7780660" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d3b42e69-dd59-4705-b682-39e5ea76f2df/audio/405861fb-d610-4ba5-bc02-f4d305e82b97/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 276: ChatGPT and Identity Reputation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d3b42e69-dd59-4705-b682-39e5ea76f2df/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:05</itunes:duration>
      <itunes:summary>ChatGPT and similar AI tools are dominating the public&apos;s mind these days.  In this episode we discuss the potential for people to attempt to use ChatGPT as a source of reputational analysis, KYC, and other information about individuals, companies, and other entities.  These activities are potentially subject to both error and deliberate misdirection.  In this episode we explain why.</itunes:summary>
      <itunes:subtitle>ChatGPT and similar AI tools are dominating the public&apos;s mind these days.  In this episode we discuss the potential for people to attempt to use ChatGPT as a source of reputational analysis, KYC, and other information about individuals, companies, and other entities.  These activities are potentially subject to both error and deliberate misdirection.  In this episode we explain why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>194</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1441249732</guid>
      <title>Root Causes 275: No Fly List Stolen</title>
      <description><![CDATA[<p>In a recently revealed security breach, an attacker gained a copy of the full 2019 TSA No Fly list, including subject PII. This breach was enabled by failures in digital identity and encryption. Join us in unpacking what happened and the lessons to be learned.</p>
]]></description>
      <pubDate>Mon, 6 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In a recently revealed security breach, an attacker gained a copy of the full 2019 TSA No Fly list, including subject PII. This breach was enabled by failures in digital identity and encryption. Join us in unpacking what happened and the lessons to be learned.</p>
]]></content:encoded>
      <enclosure length="8128966" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bce58ebd-da9c-4049-a77d-ad9bd8ce2e7a/audio/184f3807-dbc5-488f-a8e3-b8dfc49b9e13/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 275: No Fly List Stolen</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bce58ebd-da9c-4049-a77d-ad9bd8ce2e7a/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:27</itunes:duration>
      <itunes:summary>In a recently revealed security breach, an attacker gained a copy of the full 2019 TSA No Fly list, including subject PII. This breach was enabled by failures in digital identity and encryption. Join us in unpacking what happened and the lessons to be learned.</itunes:summary>
      <itunes:subtitle>In a recently revealed security breach, an attacker gained a copy of the full 2019 TSA No Fly list, including subject PII. This breach was enabled by failures in digital identity and encryption. Join us in unpacking what happened and the lessons to be learned.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>193</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1439270110</guid>
      <title>Root Causes 274: New Quantum Readiness Law</title>
      <description><![CDATA[<p>The U.S. government has a new law requiring that government agencies create plans for migrating to post-quantum cryptography in response to impending threats from quantum computers. In this episode we are joined by guest Bruno Couillard of Crypto4A to discuss the law and its implications.</p>
]]></description>
      <pubDate>Fri, 3 Feb 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The U.S. government has a new law requiring that government agencies create plans for migrating to post-quantum cryptography in response to impending threats from quantum computers. In this episode we are joined by guest Bruno Couillard of Crypto4A to discuss the law and its implications.</p>
]]></content:encoded>
      <enclosure length="13344559" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b4eac153-21eb-406d-a645-535e0557385d/audio/7d8b477f-db4b-473a-8d62-3d45bb3e898e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 274: New Quantum Readiness Law</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b4eac153-21eb-406d-a645-535e0557385d/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:53</itunes:duration>
      <itunes:summary>The U.S. government has a new law requiring that government agencies create plans for migrating to post-quantum cryptography in response to impending threats from quantum computers. In this episode we are joined by guest Bruno Couillard of Crypto4A to discuss the law and its implications.</itunes:summary>
      <itunes:subtitle>The U.S. government has a new law requiring that government agencies create plans for migrating to post-quantum cryptography in response to impending threats from quantum computers. In this episode we are joined by guest Bruno Couillard of Crypto4A to discuss the law and its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>192</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1436112121</guid>
      <title>Root Causes 273: A Deep Dive on CA Agnostic</title>
      <description><![CDATA[<p>The industry is seeing more and more attention spent on the idea of CA agnosticism. As with any buzzy technology term, it can be used to mean a variety of things. Join us as we catalog the various ways a Certificate Lifecycle Management (CLM) system can be &quot;CA agnostic.&quot;</p>
]]></description>
      <pubDate>Mon, 30 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The industry is seeing more and more attention spent on the idea of CA agnosticism. As with any buzzy technology term, it can be used to mean a variety of things. Join us as we catalog the various ways a Certificate Lifecycle Management (CLM) system can be &quot;CA agnostic.&quot;</p>
]]></content:encoded>
      <enclosure length="20449227" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cc092371-bd74-4c9c-823e-c6604dd02284/audio/f50e3b9b-41cb-46df-a81e-8e637b0a0d99/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 273: A Deep Dive on CA Agnostic</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cc092371-bd74-4c9c-823e-c6604dd02284/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:17</itunes:duration>
      <itunes:summary>The industry is seeing more and more attention spent on the idea of CA agnosticism. As with any buzzy technology term, it can be used to mean a variety of things. Join us as we catalog the various ways a Certificate Lifecycle Management (CLM) system can be &quot;CA agnostic.&quot;</itunes:summary>
      <itunes:subtitle>The industry is seeing more and more attention spent on the idea of CA agnosticism. As with any buzzy technology term, it can be used to mean a variety of things. Join us as we catalog the various ways a Certificate Lifecycle Management (CLM) system can be &quot;CA agnostic.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>191</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1433929948</guid>
      <title>Root Causes 272: OCSP&apos;s Privacy Problem</title>
      <description><![CDATA[<p>Concerns recently have been raised about OCSP real-time certificate checking and its potential to violate privacy.  In this episode we unpack these concerns and discuss the alternatives to OCSP.</p>
]]></description>
      <pubDate>Fri, 27 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Concerns recently have been raised about OCSP real-time certificate checking and its potential to violate privacy.  In this episode we unpack these concerns and discuss the alternatives to OCSP.</p>
]]></content:encoded>
      <enclosure length="11773416" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/219ca393-aaa5-4caf-b8fd-7dcfee01d9c6/audio/897b8f64-66fb-416d-9f96-0b21f1af39b6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 272: OCSP&apos;s Privacy Problem</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/219ca393-aaa5-4caf-b8fd-7dcfee01d9c6/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:15</itunes:duration>
      <itunes:summary>Concerns recently have been raised about OCSP real-time certificate checking and its potential to violate privacy.  In this episode we unpack these concerns and discuss the alternatives to OCSP.</itunes:summary>
      <itunes:subtitle>Concerns recently have been raised about OCSP real-time certificate checking and its potential to violate privacy.  In this episode we unpack these concerns and discuss the alternatives to OCSP.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>190</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1430990041</guid>
      <title>Root Causes 271: A Whole Fleet of Identity-based Automotive Hacks</title>
      <description><![CDATA[<p>A white hat security researcher recently revealed a large number of identity-based vulnerabilities across many automotive manufacturers. In this episode we explain how a group of white hats exploited these manufacturers' dependence on non-secret &quot;secrets&quot; such as VIN or email address to force a raft of unacceptable behaviors across a large number of automotive brands.</p>
]]></description>
      <pubDate>Mon, 23 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A white hat security researcher recently revealed a large number of identity-based vulnerabilities across many automotive manufacturers. In this episode we explain how a group of white hats exploited these manufacturers' dependence on non-secret &quot;secrets&quot; such as VIN or email address to force a raft of unacceptable behaviors across a large number of automotive brands.</p>
]]></content:encoded>
      <enclosure length="21458698" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/24b4eb1f-f346-4886-a74a-45804ad92892/audio/f9c3bf0a-279c-4828-8506-7208456d16b5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 271: A Whole Fleet of Identity-based Automotive Hacks</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/24b4eb1f-f346-4886-a74a-45804ad92892/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:20</itunes:duration>
      <itunes:summary>A white hat security researcher recently revealed a large number of identity-based vulnerabilities across many automotive manufacturers. In this episode we explain how a group of white hats exploited these manufacturers&apos; dependence on non-secret &quot;secrets&quot; such as VIN or email address to force a raft of unacceptable behaviors across a large number of automotive brands.</itunes:summary>
      <itunes:subtitle>A white hat security researcher recently revealed a large number of identity-based vulnerabilities across many automotive manufacturers. In this episode we explain how a group of white hats exploited these manufacturers&apos; dependence on non-secret &quot;secrets&quot; such as VIN or email address to force a raft of unacceptable behaviors across a large number of automotive brands.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>189</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1428793909</guid>
      <title>Root Causes 270: What Is the Difference Between KEM and PKE?</title>
      <description><![CDATA[<p>One of the little known changes that has come to the world of TLS is that the secret handshake and key exchange updated from Public Key Exchange (PKE) to Key Encapsulation Methods (KEM).  In this episode we explain the difference between the two methods and why this change is taking place.</p>
]]></description>
      <pubDate>Fri, 20 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One of the little known changes that has come to the world of TLS is that the secret handshake and key exchange updated from Public Key Exchange (PKE) to Key Encapsulation Methods (KEM).  In this episode we explain the difference between the two methods and why this change is taking place.</p>
]]></content:encoded>
      <enclosure length="11439050" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/54c11305-9d41-45b5-ae13-860ec3032e86/audio/661ef272-733a-4c70-a126-1d7c8697e7c1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 270: What Is the Difference Between KEM and PKE?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/54c11305-9d41-45b5-ae13-860ec3032e86/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:54</itunes:duration>
      <itunes:summary>One of the little known changes that has come to the world of TLS is that the secret handshake and key exchange updated from Public Key Exchange (PKE) to Key Encapsulation Methods (KEM).  In this episode we explain the difference between the two methods and why this change is taking place.</itunes:summary>
      <itunes:subtitle>One of the little known changes that has come to the world of TLS is that the secret handshake and key exchange updated from Public Key Exchange (PKE) to Key Encapsulation Methods (KEM).  In this episode we explain the difference between the two methods and why this change is taking place.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>188</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1425686413</guid>
      <title>Root Causes 269: Did a Patent Dispute Nearly Derail Post Quantum Cryptography?</title>
      <description><![CDATA[<p>On July 5, 2022 NIST announced its Round 3 PQC winners. What most people don't realize is that same day, the interested parties cleared a patent dispute that had the potential to prevent several of the winning primitives from moving forward. Join us as we explain who held that patent, what the potential impediment was, and how everything was resolved.</p>
]]></description>
      <pubDate>Mon, 16 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On July 5, 2022 NIST announced its Round 3 PQC winners. What most people don't realize is that same day, the interested parties cleared a patent dispute that had the potential to prevent several of the winning primitives from moving forward. Join us as we explain who held that patent, what the potential impediment was, and how everything was resolved.</p>
]]></content:encoded>
      <enclosure length="9469100" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dd5bd526-111e-47cd-8d0c-5d23bebeb651/audio/10d5b74c-0d1d-4f03-9edd-effa5580034a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 269: Did a Patent Dispute Nearly Derail Post Quantum Cryptography?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dd5bd526-111e-47cd-8d0c-5d23bebeb651/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:51</itunes:duration>
      <itunes:summary>On July 5, 2022 NIST announced its Round 3 PQC winners. What most people don&apos;t realize is that same day, the interested parties cleared a patent dispute that had the potential to prevent several of the winning primitives from moving forward. Join us as we explain who held that patent, what the potential impediment was, and how everything was resolved.</itunes:summary>
      <itunes:subtitle>On July 5, 2022 NIST announced its Round 3 PQC winners. What most people don&apos;t realize is that same day, the interested parties cleared a patent dispute that had the potential to prevent several of the winning primitives from moving forward. Join us as we explain who held that patent, what the potential impediment was, and how everything was resolved.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>187</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1422711448</guid>
      <title>Root Causes 268: WAFs Subverted by JSON Bypass</title>
      <description><![CDATA[<p>In this episode we discuss rising attacks that overcome the protections of Web Application Firewalls (WAF).  We explain these attacks, why this bypass might effective against you even if think it doesn't, and what you should do to ensure you're safe.</p>
]]></description>
      <pubDate>Thu, 12 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss rising attacks that overcome the protections of Web Application Firewalls (WAF).  We explain these attacks, why this bypass might effective against you even if think it doesn't, and what you should do to ensure you're safe.</p>
]]></content:encoded>
      <enclosure length="8536211" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/551d5d8a-306a-46ee-b99e-bc3790a09653/audio/e81f65d0-ef81-4b26-b899-1ad002ac14b3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 268: WAFs Subverted by JSON Bypass</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/551d5d8a-306a-46ee-b99e-bc3790a09653/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:53</itunes:duration>
      <itunes:summary>In this episode we discuss rising attacks that overcome the protections of Web Application Firewalls (WAF).  We explain these attacks, why this bypass might effective against you even if think it doesn&apos;t, and what you should do to ensure you&apos;re safe.</itunes:summary>
      <itunes:subtitle>In this episode we discuss rising attacks that overcome the protections of Web Application Firewalls (WAF).  We explain these attacks, why this bypass might effective against you even if think it doesn&apos;t, and what you should do to ensure you&apos;re safe.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>186</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1420009558</guid>
      <title>Root Causes 267: Can Quantum Computers Break RSA Today?</title>
      <description><![CDATA[<p>Much has been made of Schor's algorithm and the inevitable defeat of RSA using quantum computers. But a new research paper suggests a quantum computer may be applied to the problem in a fundamentally different way, hastening RSA's demise beyond even our current expected timelines. In this episode we discuss this new research, reactions to it, and its potential implications.</p>
]]></description>
      <pubDate>Mon, 9 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Much has been made of Schor's algorithm and the inevitable defeat of RSA using quantum computers. But a new research paper suggests a quantum computer may be applied to the problem in a fundamentally different way, hastening RSA's demise beyond even our current expected timelines. In this episode we discuss this new research, reactions to it, and its potential implications.</p>
]]></content:encoded>
      <enclosure length="21937580" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ce705de8-e5de-4b5e-89cb-4473f3561aa0/audio/b837e4c3-6655-42f9-a207-643ac2c472f0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 267: Can Quantum Computers Break RSA Today?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ce705de8-e5de-4b5e-89cb-4473f3561aa0/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:51</itunes:duration>
      <itunes:summary>Much has been made of Schor&apos;s algorithm and the inevitable defeat of RSA using quantum computers. But a new research paper suggests a quantum computer may be applied to the problem in a fundamentally different way, hastening RSA&apos;s demise beyond even our current expected timelines. In this episode we discuss this new research, reactions to it, and its potential implications.</itunes:summary>
      <itunes:subtitle>Much has been made of Schor&apos;s algorithm and the inevitable defeat of RSA using quantum computers. But a new research paper suggests a quantum computer may be applied to the problem in a fundamentally different way, hastening RSA&apos;s demise beyond even our current expected timelines. In this episode we discuss this new research, reactions to it, and its potential implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>185</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1416429175</guid>
      <title>Root Causes 266: End-to-end Encryption in the Apple Technology Stack</title>
      <description><![CDATA[<p>Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem. In this episode we detail the announced changes and some of their implications.</p>
]]></description>
      <pubDate>Wed, 4 Jan 2023 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem. In this episode we detail the announced changes and some of their implications.</p>
]]></content:encoded>
      <enclosure length="17227972" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/73a0fb9c-d0fb-4401-a791-4483505e8304/audio/beaf6e67-84ee-46d6-a48c-321bc241ddf4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 266: End-to-end Encryption in the Apple Technology Stack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/73a0fb9c-d0fb-4401-a791-4483505e8304/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:56</itunes:duration>
      <itunes:summary>Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem. In this episode we detail the announced changes and some of their implications.</itunes:summary>
      <itunes:subtitle>Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem. In this episode we detail the announced changes and some of their implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>184</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1411919035</guid>
      <title>Root Causes 265: A Banner Year for Post-quantum Cryptography</title>
      <description><![CDATA[<p>2022 was post-quantum cryptography's biggest year so far.  Our hosts are joined by guest Bruno Couillard, CEO and CTO of Crypto4A.  We go over many developments in PQC, including the announcement of the NIST round 3 winners, the defeat of several late candidate algorithms, isogeny-based cryptography, hybrid certificates, and the significance of April 14, 2030.</p>
]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>2022 was post-quantum cryptography's biggest year so far.  Our hosts are joined by guest Bruno Couillard, CEO and CTO of Crypto4A.  We go over many developments in PQC, including the announcement of the NIST round 3 winners, the defeat of several late candidate algorithms, isogeny-based cryptography, hybrid certificates, and the significance of April 14, 2030.</p>
]]></content:encoded>
      <enclosure length="31884054" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cb2a2f58-2e5d-4c2f-9155-f117c139b65f/audio/26d6cc10-c62a-4489-804a-c18898c007b9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 265: A Banner Year for Post-quantum Cryptography</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cb2a2f58-2e5d-4c2f-9155-f117c139b65f/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:12</itunes:duration>
      <itunes:summary>2022 was post-quantum cryptography&apos;s biggest year so far.  Our hosts are joined by guest Bruno Couillard, CEO and CTO of Crypto4A.  We go over many developments in PQC, including the announcement of the NIST round 3 winners, the defeat of several late candidate algorithms, isogeny-based cryptography, hybrid certificates, and the significance of April 14, 2030.</itunes:summary>
      <itunes:subtitle>2022 was post-quantum cryptography&apos;s biggest year so far.  Our hosts are joined by guest Bruno Couillard, CEO and CTO of Crypto4A.  We go over many developments in PQC, including the announcement of the NIST round 3 winners, the defeat of several late candidate algorithms, isogeny-based cryptography, hybrid certificates, and the significance of April 14, 2030.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>183</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1409087032</guid>
      <title>Root Causes 264: Crypto Agility for 2023</title>
      <description><![CDATA[<p>We define the important needs and initiatives that are changing the crypto agility landscape.  We discuss topics including CA independence, cryptography in public clouds, post-quantum cryptography (PQC) agility, hybrid certificates, and FIDO 2/WebAuthn.</p>
]]></description>
      <pubDate>Fri, 23 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We define the important needs and initiatives that are changing the crypto agility landscape.  We discuss topics including CA independence, cryptography in public clouds, post-quantum cryptography (PQC) agility, hybrid certificates, and FIDO 2/WebAuthn.</p>
]]></content:encoded>
      <enclosure length="18296929" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/42bf5dbb-9675-4579-af73-2c4c60f2cb9e/audio/8df1d95d-4eca-435a-9061-0d3ecdf79152/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 264: Crypto Agility for 2023</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/42bf5dbb-9675-4579-af73-2c4c60f2cb9e/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:03</itunes:duration>
      <itunes:summary>We define the important needs and initiatives that are changing the crypto agility landscape.  We discuss topics including CA independence, cryptography in public clouds, post-quantum cryptography (PQC) agility, hybrid certificates, and FIDO 2/WebAuthn.</itunes:summary>
      <itunes:subtitle>We define the important needs and initiatives that are changing the crypto agility landscape.  We discuss topics including CA independence, cryptography in public clouds, post-quantum cryptography (PQC) agility, hybrid certificates, and FIDO 2/WebAuthn.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>182</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1406776609</guid>
      <title>Root Causes 263: Secure Connection Methods Roundup</title>
      <description><![CDATA[<p>In this episode we discuss the three methods a user might choose for secure remote communications: VPN, SSH, and TOR.  For each we discuss the reasons you might choose them and the pros and cons of each.</p>
]]></description>
      <pubDate>Tue, 20 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we discuss the three methods a user might choose for secure remote communications: VPN, SSH, and TOR.  For each we discuss the reasons you might choose them and the pros and cons of each.</p>
]]></content:encoded>
      <enclosure length="24531729" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8c282e44-82fe-466c-b29b-dee5e1ab829e/audio/050b9efc-2fb5-4e5c-a06a-278b3ab69a46/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 263: Secure Connection Methods Roundup</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8c282e44-82fe-466c-b29b-dee5e1ab829e/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:32</itunes:duration>
      <itunes:summary>In this episode we discuss the three methods a user might choose for secure remote communications: VPN, SSH, and TOR.  For each we discuss the reasons you might choose them and the pros and cons of each.</itunes:summary>
      <itunes:subtitle>In this episode we discuss the three methods a user might choose for secure remote communications: VPN, SSH, and TOR.  For each we discuss the reasons you might choose them and the pros and cons of each.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>181</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1402889653</guid>
      <title>Root Causes 262: The Continuing Erosion of Online Identity</title>
      <description><![CDATA[<p>In one of our 2022 wrap up episodes, we look back at the continued erosion of the idea of reliable online identity throughout the year. We discuss the rise of deep fakes, celebrity phishing, voice biometrics, AI-generated art, trust models, and the failure of Twitter blue check marks.</p>
]]></description>
      <pubDate>Wed, 14 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In one of our 2022 wrap up episodes, we look back at the continued erosion of the idea of reliable online identity throughout the year. We discuss the rise of deep fakes, celebrity phishing, voice biometrics, AI-generated art, trust models, and the failure of Twitter blue check marks.</p>
]]></content:encoded>
      <enclosure length="22049183" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d9c8ccff-4979-4b7f-b8ad-198cd8bfc623/audio/d611df9e-7194-462b-a828-00dc6192f8ce/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 262: The Continuing Erosion of Online Identity</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d9c8ccff-4979-4b7f-b8ad-198cd8bfc623/3000x3000/artworks-u5dknjketxypeeyw-uyasgq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:57</itunes:duration>
      <itunes:summary>In one of our 2022 wrap up episodes, we look back at the continued erosion of the idea of reliable online identity throughout the year. We discuss the rise of deep fakes, celebrity phishing, voice biometrics, AI-generated art, trust models, and the failure of Twitter blue check marks.</itunes:summary>
      <itunes:subtitle>In one of our 2022 wrap up episodes, we look back at the continued erosion of the idea of reliable online identity throughout the year. We discuss the rise of deep fakes, celebrity phishing, voice biometrics, AI-generated art, trust models, and the failure of Twitter blue check marks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>180</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1401876283</guid>
      <title>Root Causes 261: Why I Don&apos;t Say Spoof</title>
      <description><![CDATA[<p>The word spoof is a security industry term used in the context of social engineering attacks.  In this episode we explore the word's connotations in different walks of life and why its connotations may not serve us well when applied to security concerns.</p>
]]></description>
      <pubDate>Mon, 12 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The word spoof is a security industry term used in the context of social engineering attacks.  In this episode we explore the word's connotations in different walks of life and why its connotations may not serve us well when applied to security concerns.</p>
]]></content:encoded>
      <enclosure length="9727947" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/25d2fe32-2c9b-4ecc-ad23-c08ddc8f944c/audio/829b11d4-0819-42db-aec3-cc26c90e33fb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 261: Why I Don&apos;t Say Spoof</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/25d2fe32-2c9b-4ecc-ad23-c08ddc8f944c/3000x3000/artworks-gwtikavpcezep1st-nrdb2g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:07</itunes:duration>
      <itunes:summary>The word spoof is a security industry term used in the context of social engineering attacks.  In this episode we explore the word&apos;s connotations in different walks of life and why its connotations may not serve us well when applied to security concerns.</itunes:summary>
      <itunes:subtitle>The word spoof is a security industry term used in the context of social engineering attacks.  In this episode we explore the word&apos;s connotations in different walks of life and why its connotations may not serve us well when applied to security concerns.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>179</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1398950962</guid>
      <title>Root Causes 260: CA TrustCor Deprecated</title>
      <description><![CDATA[<p>Public CA TrustCor has had its roots deprecated by Microsoft and Mozilla, following a public dialog about TrustCor's suitability as a public CA. This entire investigation was prompted by a Washington Post article articulating a series of connections between this CA and spyware purveyors.  In this episode we explain these connections, the public dialog and investigation that occurred, and the ultimate deprecation of TrustCor.</p>
]]></description>
      <pubDate>Thu, 8 Dec 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Public CA TrustCor has had its roots deprecated by Microsoft and Mozilla, following a public dialog about TrustCor's suitability as a public CA. This entire investigation was prompted by a Washington Post article articulating a series of connections between this CA and spyware purveyors.  In this episode we explain these connections, the public dialog and investigation that occurred, and the ultimate deprecation of TrustCor.</p>
]]></content:encoded>
      <enclosure length="28993994" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/06535e65-d88a-4026-ae3e-96676caf34fd/audio/fc9f3c0a-a436-4eca-b8b1-b36168f2a532/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 260: CA TrustCor Deprecated</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/06535e65-d88a-4026-ae3e-96676caf34fd/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:11</itunes:duration>
      <itunes:summary>Public CA TrustCor has had its roots deprecated by Microsoft and Mozilla, following a public dialog about TrustCor&apos;s suitability as a public CA. This entire investigation was prompted by a Washington Post article articulating a series of connections between this CA and spyware purveyors.  In this episode we explain these connections, the public dialog and investigation that occurred, and the ultimate deprecation of TrustCor.</itunes:summary>
      <itunes:subtitle>Public CA TrustCor has had its roots deprecated by Microsoft and Mozilla, following a public dialog about TrustCor&apos;s suitability as a public CA. This entire investigation was prompted by a Washington Post article articulating a series of connections between this CA and spyware purveyors.  In this episode we explain these connections, the public dialog and investigation that occurred, and the ultimate deprecation of TrustCor.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>178</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1393626763</guid>
      <title>Root Causes 259: What Went Wrong with the Twitter Blue Check Marks</title>
      <description><![CDATA[<p>The Twitter authenticated identity blue check marks made a big splash and then quickly went away.  In this episode we explore the intent of these check marks and why they failed.  In particular, we detail the challenges involved in authenticating and vouching for the identity of an individual or organization.</p>
]]></description>
      <pubDate>Wed, 30 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The Twitter authenticated identity blue check marks made a big splash and then quickly went away.  In this episode we explore the intent of these check marks and why they failed.  In particular, we detail the challenges involved in authenticating and vouching for the identity of an individual or organization.</p>
]]></content:encoded>
      <enclosure length="13713296" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/aed98b79-0027-4e6d-b998-5051d6edee30/audio/9771e6c6-b991-4f73-9824-48957bb94198/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 259: What Went Wrong with the Twitter Blue Check Marks</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/aed98b79-0027-4e6d-b998-5051d6edee30/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:16</itunes:duration>
      <itunes:summary>The Twitter authenticated identity blue check marks made a big splash and then quickly went away.  In this episode we explore the intent of these check marks and why they failed.  In particular, we detail the challenges involved in authenticating and vouching for the identity of an individual or organization.</itunes:summary>
      <itunes:subtitle>The Twitter authenticated identity blue check marks made a big splash and then quickly went away.  In this episode we explore the intent of these check marks and why they failed.  In particular, we detail the challenges involved in authenticating and vouching for the identity of an individual or organization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>177</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1388255815</guid>
      <title>Root Causes 258: New S/MIME Baseline Requirements Ratified</title>
      <description><![CDATA[<p>The CA/Browser Forum has passed new Baseline Requirements for S/MIME certificates, in effect late 2023.  In this episode we explain the broad stipulations of the new S/MIME BRs, including the multiple available levels of authentication and use case profiles that will be allowed.</p>
]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CA/Browser Forum has passed new Baseline Requirements for S/MIME certificates, in effect late 2023.  In this episode we explain the broad stipulations of the new S/MIME BRs, including the multiple available levels of authentication and use case profiles that will be allowed.</p>
]]></content:encoded>
      <enclosure length="16393407" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/033bff93-9c75-48c6-9f21-483f853b7dff/audio/06965419-f9c9-4476-89c5-a3180da98879/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 258: New S/MIME Baseline Requirements Ratified</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/033bff93-9c75-48c6-9f21-483f853b7dff/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:04</itunes:duration>
      <itunes:summary>The CA/Browser Forum has passed new Baseline Requirements for S/MIME certificates, in effect late 2023.  In this episode we explain the broad stipulations of the new S/MIME BRs, including the multiple available levels of authentication and use case profiles that will be allowed.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum has passed new Baseline Requirements for S/MIME certificates, in effect late 2023.  In this episode we explain the broad stipulations of the new S/MIME BRs, including the multiple available levels of authentication and use case profiles that will be allowed.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>176</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1385958775</guid>
      <title>Root Causes 257: FTX Crypto Exchange Collapses</title>
      <description><![CDATA[<p>&quot;If you don't hold the keys, you don't hold the cheese.&quot; Crypto exchange giant FTX recently collapsed, causing ripples through the cryptocurrency world. In this episode we focus on the cryptographic difference between cryptocurrency exchanges and other exchanges and how specific FTX user experience decisions led to the loss of valuable digital assets for investors.</p>
]]></description>
      <pubDate>Thu, 17 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>&quot;If you don't hold the keys, you don't hold the cheese.&quot; Crypto exchange giant FTX recently collapsed, causing ripples through the cryptocurrency world. In this episode we focus on the cryptographic difference between cryptocurrency exchanges and other exchanges and how specific FTX user experience decisions led to the loss of valuable digital assets for investors.</p>
]]></content:encoded>
      <enclosure length="10963939" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8af0aa62-0a5a-47be-b10c-68db2eab6a15/audio/4c330b46-a90c-4028-a238-3934b45614da/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 257: FTX Crypto Exchange Collapses</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8af0aa62-0a5a-47be-b10c-68db2eab6a15/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:24</itunes:duration>
      <itunes:summary>&quot;If you don&apos;t hold the keys, you don&apos;t hold the cheese.&quot; Crypto exchange giant FTX recently collapsed, causing ripples through the cryptocurrency world. In this episode we focus on the cryptographic difference between cryptocurrency exchanges and other exchanges and how specific FTX user experience decisions led to the loss of valuable digital assets for investors.</itunes:summary>
      <itunes:subtitle>&quot;If you don&apos;t hold the keys, you don&apos;t hold the cheese.&quot; Crypto exchange giant FTX recently collapsed, causing ripples through the cryptocurrency world. In this episode we focus on the cryptographic difference between cryptocurrency exchanges and other exchanges and how specific FTX user experience decisions led to the loss of valuable digital assets for investors.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>175</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1384433785</guid>
      <title>Root Causes 256: What Is Harvest and Decrypt?</title>
      <description><![CDATA[<p>As we prepare for the reality of quantum computers breaking RSA and ECC, a keenly important concept to understand is &quot;Harvest and Decrypt.&quot;  The practical impact of Harvest and Decrypt is that for secrets with a reasonable lifespan, the quantum computer threat is much closer than you might think, including as early as today. In this episode we explain why that's the case and how this attack is likely to roll out.</p>
]]></description>
      <pubDate>Wed, 16 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As we prepare for the reality of quantum computers breaking RSA and ECC, a keenly important concept to understand is &quot;Harvest and Decrypt.&quot;  The practical impact of Harvest and Decrypt is that for secrets with a reasonable lifespan, the quantum computer threat is much closer than you might think, including as early as today. In this episode we explain why that's the case and how this attack is likely to roll out.</p>
]]></content:encoded>
      <enclosure length="18768273" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/709576b6-4740-48ce-95ed-812e5dcd6bf9/audio/cef8c2c3-b9fd-4c59-a6f9-569f52b3c276/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 256: What Is Harvest and Decrypt?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/709576b6-4740-48ce-95ed-812e5dcd6bf9/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:32</itunes:duration>
      <itunes:summary>As we prepare for the reality of quantum computers breaking RSA and ECC, a keenly important concept to understand is &quot;Harvest and Decrypt.&quot;  The practical impact of Harvest and Decrypt is that for secrets with a reasonable lifespan, the quantum computer threat is much closer than you might think, including as early as today. In this episode we explain why that&apos;s the case and how this attack is likely to roll out.</itunes:summary>
      <itunes:subtitle>As we prepare for the reality of quantum computers breaking RSA and ECC, a keenly important concept to understand is &quot;Harvest and Decrypt.&quot;  The practical impact of Harvest and Decrypt is that for secrets with a reasonable lifespan, the quantum computer threat is much closer than you might think, including as early as today. In this episode we explain why that&apos;s the case and how this attack is likely to roll out.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>174</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1380955333</guid>
      <title>Root Causes 255: What Is a Privacy Browser?</title>
      <description><![CDATA[<p>In this episode we describe privacy browsers, which quite simply are browsers designed to pay special attention to the user's privacy, including some of the strategies they use to protect privacy and the pros and cons of this approach.</p>
]]></description>
      <pubDate>Fri, 11 Nov 2022 15:02:20 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe privacy browsers, which quite simply are browsers designed to pay special attention to the user's privacy, including some of the strategies they use to protect privacy and the pros and cons of this approach.</p>
]]></content:encoded>
      <enclosure length="21885497" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/44730daa-051a-48e8-bd58-17eceba0c193/audio/f06745ac-8703-4a14-9544-da6b13bf0b3e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 255: What Is a Privacy Browser?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/44730daa-051a-48e8-bd58-17eceba0c193/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:47</itunes:duration>
      <itunes:summary>In this episode we describe privacy browsers, which quite simply are browsers designed to pay special attention to the user&apos;s privacy, including some of the strategies they use to protect privacy and the pros and cons of this approach.</itunes:summary>
      <itunes:subtitle>In this episode we describe privacy browsers, which quite simply are browsers designed to pay special attention to the user&apos;s privacy, including some of the strategies they use to protect privacy and the pros and cons of this approach.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>173</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1378819801</guid>
      <title>Root Causes 254: Toyota Symmetric Key Exposed on GitHub</title>
      <description><![CDATA[<p>In a recently exposed error, key material for a popular automobile manufacturer's PKI has been discovered on GitHub, resulting in exposure of sensitive information.  In this episode we explain the dual errors that led to this breach.</p>
]]></description>
      <pubDate>Tue, 8 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In a recently exposed error, key material for a popular automobile manufacturer's PKI has been discovered on GitHub, resulting in exposure of sensitive information.  In this episode we explain the dual errors that led to this breach.</p>
]]></content:encoded>
      <enclosure length="10463312" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d012c4aa-6751-4307-9e5b-d69142642fff/audio/f8cffc20-a8f4-4d45-9e4d-3c1eca0dfa5d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 254: Toyota Symmetric Key Exposed on GitHub</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d012c4aa-6751-4307-9e5b-d69142642fff/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:53</itunes:duration>
      <itunes:summary>In a recently exposed error, key material for a popular automobile manufacturer&apos;s PKI has been discovered on GitHub, resulting in exposure of sensitive information.  In this episode we explain the dual errors that led to this breach.</itunes:summary>
      <itunes:subtitle>In a recently exposed error, key material for a popular automobile manufacturer&apos;s PKI has been discovered on GitHub, resulting in exposure of sensitive information.  In this episode we explain the dual errors that led to this breach.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>172</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1376617399</guid>
      <title>Root Causes 253: OpenSSL Vulnerability Explained</title>
      <description><![CDATA[<p>Last week the OpenSSL project announced an upcoming critical patch, leading to a great deal of speculation about this flaw and its implications for SSL certificates.  We explain what the flaw was, what you should do, and why it is that certificates are unaffected.</p>
]]></description>
      <pubDate>Fri, 4 Nov 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Last week the OpenSSL project announced an upcoming critical patch, leading to a great deal of speculation about this flaw and its implications for SSL certificates.  We explain what the flaw was, what you should do, and why it is that certificates are unaffected.</p>
]]></content:encoded>
      <enclosure length="8928464" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/61a967ab-cf58-43a6-991f-d7abd8ca66a0/audio/7bcc1694-5317-4dd8-b72a-9bf34add7541/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 253: OpenSSL Vulnerability Explained</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/61a967ab-cf58-43a6-991f-d7abd8ca66a0/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:17</itunes:duration>
      <itunes:summary>Last week the OpenSSL project announced an upcoming critical patch, leading to a great deal of speculation about this flaw and its implications for SSL certificates.  We explain what the flaw was, what you should do, and why it is that certificates are unaffected.</itunes:summary>
      <itunes:subtitle>Last week the OpenSSL project announced an upcoming critical patch, leading to a great deal of speculation about this flaw and its implications for SSL certificates.  We explain what the flaw was, what you should do, and why it is that certificates are unaffected.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>171</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1374493801</guid>
      <title>Root Causes 252: Sidestepping Microsoft Email Encryption</title>
      <description><![CDATA[<p>A recently revealed vulnerability in Microsoft Exchange encryption can be used potentially to break the encryption on stored emails. In this episode we explain ECB (Electronic Code Book encryption and how this attack can occur.</p>
]]></description>
      <pubDate>Sun, 30 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recently revealed vulnerability in Microsoft Exchange encryption can be used potentially to break the encryption on stored emails. In this episode we explain ECB (Electronic Code Book encryption and how this attack can occur.</p>
]]></content:encoded>
      <enclosure length="13630855" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/35a7f3c4-99db-4a79-94ab-3902650e0e4f/audio/2724b3d9-827a-4e89-83a0-d491b6e69e63/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 252: Sidestepping Microsoft Email Encryption</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/35a7f3c4-99db-4a79-94ab-3902650e0e4f/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:11</itunes:duration>
      <itunes:summary>A recently revealed vulnerability in Microsoft Exchange encryption can be used potentially to break the encryption on stored emails. In this episode we explain ECB (Electronic Code Book encryption and how this attack can occur.</itunes:summary>
      <itunes:subtitle>A recently revealed vulnerability in Microsoft Exchange encryption can be used potentially to break the encryption on stored emails. In this episode we explain ECB (Electronic Code Book encryption and how this attack can occur.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>170</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1372032334</guid>
      <title>Root Causes 251: What&apos;s Next for the NIST PQC Primitives?</title>
      <description><![CDATA[<p>NIST has announced its new post-quantum cryptography primitives. So now what? In this episode we discuss the next steps required by the technology industry for widespread adoption of these algorithms and what the enterprise can do starting today to ready itself for quantum-safe encryption.</p>
]]></description>
      <pubDate>Thu, 27 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST has announced its new post-quantum cryptography primitives. So now what? In this episode we discuss the next steps required by the technology industry for widespread adoption of these algorithms and what the enterprise can do starting today to ready itself for quantum-safe encryption.</p>
]]></content:encoded>
      <enclosure length="19932691" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/dc6d18a7-895a-415c-b645-19c0a524f8c7/audio/2b6fed36-8bb8-43d6-b72b-b99bf8c485e5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 251: What&apos;s Next for the NIST PQC Primitives?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/dc6d18a7-895a-415c-b645-19c0a524f8c7/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:45</itunes:duration>
      <itunes:summary>NIST has announced its new post-quantum cryptography primitives. So now what? In this episode we discuss the next steps required by the technology industry for widespread adoption of these algorithms and what the enterprise can do starting today to ready itself for quantum-safe encryption.</itunes:summary>
      <itunes:subtitle>NIST has announced its new post-quantum cryptography primitives. So now what? In this episode we discuss the next steps required by the technology industry for widespread adoption of these algorithms and what the enterprise can do starting today to ready itself for quantum-safe encryption.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>169</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1370410666</guid>
      <title>Root Causes 250: 250 Episodes of Root Causes!</title>
      <description><![CDATA[<p>It's Root Causes episode 250! In this episode Tim and Jason indulge themselves in podcasting about podcasting.  Hear about setting up a podcast, choosing topics, why we don't rehearse, why we have so few guests, and how we reacted the first time someone asked us for a media kit.</p>
]]></description>
      <pubDate>Wed, 26 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>It's Root Causes episode 250! In this episode Tim and Jason indulge themselves in podcasting about podcasting.  Hear about setting up a podcast, choosing topics, why we don't rehearse, why we have so few guests, and how we reacted the first time someone asked us for a media kit.</p>
]]></content:encoded>
      <enclosure length="25504589" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4a0353a7-146e-488b-8340-e077fd97a34c/audio/be50f3f0-afbb-40cc-af4c-ae7cf795a35f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 250: 250 Episodes of Root Causes!</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4a0353a7-146e-488b-8340-e077fd97a34c/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:33</itunes:duration>
      <itunes:summary>It&apos;s Root Causes episode 250! In this episode Tim and Jason indulge themselves in podcasting about podcasting.  Hear about setting up a podcast, choosing topics, why we don&apos;t rehearse, why we have so few guests, and how we reacted the first time someone asked us for a media kit.</itunes:summary>
      <itunes:subtitle>It&apos;s Root Causes episode 250! In this episode Tim and Jason indulge themselves in podcasting about podcasting.  Hear about setting up a podcast, choosing topics, why we don&apos;t rehearse, why we have so few guests, and how we reacted the first time someone asked us for a media kit.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>168</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1367719174</guid>
      <title>Root Causes 249:  What Is MFA Exhaustion?</title>
      <description><![CDATA[<p>Recent months have seen several high profile attacks that were enabled by defeating the MFA accompanying user name and password login.  In this episode we explain the concept of MFA fatigue and why it is an enabler for these attacks.</p>
]]></description>
      <pubDate>Fri, 21 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent months have seen several high profile attacks that were enabled by defeating the MFA accompanying user name and password login.  In this episode we explain the concept of MFA fatigue and why it is an enabler for these attacks.</p>
]]></content:encoded>
      <enclosure length="9983030" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/881f2563-ae6c-41e6-8ec3-c02dbe1bd0d3/audio/9180753b-170d-4eaa-b9f7-f109b63dcde3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 249:  What Is MFA Exhaustion?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/881f2563-ae6c-41e6-8ec3-c02dbe1bd0d3/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:23</itunes:duration>
      <itunes:summary>Recent months have seen several high profile attacks that were enabled by defeating the MFA accompanying user name and password login.  In this episode we explain the concept of MFA fatigue and why it is an enabler for these attacks.</itunes:summary>
      <itunes:subtitle>Recent months have seen several high profile attacks that were enabled by defeating the MFA accompanying user name and password login.  In this episode we explain the concept of MFA fatigue and why it is an enabler for these attacks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>167</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1365415801</guid>
      <title>Root Causes 248: Azure Code Signing Announced</title>
      <description><![CDATA[<p>Microsoft has announced the upcoming availability of a Microsoft-run code signing solution inside the Azure platform. We explain this approach's advantages and what to expect from it.</p>
]]></description>
      <pubDate>Tue, 18 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Microsoft has announced the upcoming availability of a Microsoft-run code signing solution inside the Azure platform. We explain this approach's advantages and what to expect from it.</p>
]]></content:encoded>
      <enclosure length="9066044" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/53513178-f09d-4c7a-bcc6-a1788021e4df/audio/9a3beb3f-6d5a-46af-a3a0-3a3864ca3d69/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 248: Azure Code Signing Announced</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/53513178-f09d-4c7a-bcc6-a1788021e4df/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:26</itunes:duration>
      <itunes:summary>Microsoft has announced the upcoming availability of a Microsoft-run code signing solution inside the Azure platform. We explain this approach&apos;s advantages and what to expect from it.</itunes:summary>
      <itunes:subtitle>Microsoft has announced the upcoming availability of a Microsoft-run code signing solution inside the Azure platform. We explain this approach&apos;s advantages and what to expect from it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>166</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1362421999</guid>
      <title>Root Causes 247: Uber Breach Unpacked</title>
      <description><![CDATA[<p>A recent high-profile breach of Uber's systems led to widespread data loss.  Join our experts as we unpack the specifics of how this attack came about.</p>
]]></description>
      <pubDate>Thu, 13 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent high-profile breach of Uber's systems led to widespread data loss.  Join our experts as we unpack the specifics of how this attack came about.</p>
]]></content:encoded>
      <enclosure length="11557898" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/99d56f8e-57c3-4f33-b071-9893b20630d5/audio/94f99c94-b9b2-4284-8317-3eee12ca0472/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 247: Uber Breach Unpacked</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/99d56f8e-57c3-4f33-b071-9893b20630d5/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:01</itunes:duration>
      <itunes:summary>A recent high-profile breach of Uber&apos;s systems led to widespread data loss.  Join our experts as we unpack the specifics of how this attack came about.</itunes:summary>
      <itunes:subtitle>A recent high-profile breach of Uber&apos;s systems led to widespread data loss.  Join our experts as we unpack the specifics of how this attack came about.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>165</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1356774772</guid>
      <title>Root Causes 246: Google Chrome Root Program Announced</title>
      <description><![CDATA[<p>Google Chrome recently announced the formation of its trusted root program. It may be surprising to learn that the world's most popular browser has existed for more than a decade without its own root program. In this episode we explain why that is the case, why Chrome is launching a root program now, and the implications of this announcement.</p>
]]></description>
      <pubDate>Mon, 3 Oct 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Google Chrome recently announced the formation of its trusted root program. It may be surprising to learn that the world's most popular browser has existed for more than a decade without its own root program. In this episode we explain why that is the case, why Chrome is launching a root program now, and the implications of this announcement.</p>
]]></content:encoded>
      <enclosure length="11532983" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3750317c-083e-40ce-a038-655c3a6a562d/audio/30f56487-20c8-4468-9824-278cae1ae765/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 246: Google Chrome Root Program Announced</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3750317c-083e-40ce-a038-655c3a6a562d/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:00</itunes:duration>
      <itunes:summary>Google Chrome recently announced the formation of its trusted root program. It may be surprising to learn that the world&apos;s most popular browser has existed for more than a decade without its own root program. In this episode we explain why that is the case, why Chrome is launching a root program now, and the implications of this announcement.</itunes:summary>
      <itunes:subtitle>Google Chrome recently announced the formation of its trusted root program. It may be surprising to learn that the world&apos;s most popular browser has existed for more than a decade without its own root program. In this episode we explain why that is the case, why Chrome is launching a root program now, and the implications of this announcement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>164</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1353681415</guid>
      <title>Root Causes 245: One Time Passcode as a Liability</title>
      <description><![CDATA[<p>A recent article from Brian Krebs advances the idea that using OTP MFA may actually be a liability to security.  In this episode we explain the reasoning behind this characterization.</p>
]]></description>
      <pubDate>Thu, 29 Sep 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent article from Brian Krebs advances the idea that using OTP MFA may actually be a liability to security.  In this episode we explain the reasoning behind this characterization.</p>
]]></content:encoded>
      <enclosure length="9771732" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f41acb1b-dbd0-4681-9b75-75760105ea36/audio/c3c0bb6f-d5bf-40ac-905d-25f31fcd81fc/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 245: One Time Passcode as a Liability</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f41acb1b-dbd0-4681-9b75-75760105ea36/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:10</itunes:duration>
      <itunes:summary>A recent article from Brian Krebs advances the idea that using OTP MFA may actually be a liability to security.  In this episode we explain the reasoning behind this characterization.</itunes:summary>
      <itunes:subtitle>A recent article from Brian Krebs advances the idea that using OTP MFA may actually be a liability to security.  In this episode we explain the reasoning behind this characterization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1351414354</guid>
      <title>Root Causes 244: PwC Survey Reports Cyber Security as Biggest Risk to Companies</title>
      <description><![CDATA[<p>A recent survey from PwC reports that cyber threats are no longer solely the domain on the CISO but instead have become every senior executive's concern.  We dive deep into these survey results and talk about they correlate with our own experiences, IT skills gaps, and feeding the podcasting beast.</p>
]]></description>
      <pubDate>Mon, 26 Sep 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent survey from PwC reports that cyber threats are no longer solely the domain on the CISO but instead have become every senior executive's concern.  We dive deep into these survey results and talk about they correlate with our own experiences, IT skills gaps, and feeding the podcasting beast.</p>
]]></content:encoded>
      <enclosure length="15037510" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0d4b3c21-cb15-499e-adab-3310a7166b13/audio/10a521f7-d930-4cea-886f-fc8686806008/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 244: PwC Survey Reports Cyber Security as Biggest Risk to Companies</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0d4b3c21-cb15-499e-adab-3310a7166b13/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:39</itunes:duration>
      <itunes:summary>A recent survey from PwC reports that cyber threats are no longer solely the domain on the CISO but instead have become every senior executive&apos;s concern.  We dive deep into these survey results and talk about they correlate with our own experiences, IT skills gaps, and feeding the podcasting beast.</itunes:summary>
      <itunes:subtitle>A recent survey from PwC reports that cyber threats are no longer solely the domain on the CISO but instead have become every senior executive&apos;s concern.  We dive deep into these survey results and talk about they correlate with our own experiences, IT skills gaps, and feeding the podcasting beast.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>162</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1347656671</guid>
      <title>Root Causes 243: Which Came First, the BRs or the EVGs?</title>
      <description><![CDATA[<p>Many people don't realize that the CA/Browser Forum's Baseline Requirements actually came LATER THAN the Extended Validation Guidelines. In this episode we explain how this seemly backward turn of events came about and what it says about how online trust has evolved over the past few decades.</p>
]]></description>
      <pubDate>Tue, 20 Sep 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Many people don't realize that the CA/Browser Forum's Baseline Requirements actually came LATER THAN the Extended Validation Guidelines. In this episode we explain how this seemly backward turn of events came about and what it says about how online trust has evolved over the past few decades.</p>
]]></content:encoded>
      <enclosure length="10127620" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ac15a28-6726-4c38-949a-457e4b62e90e/audio/893c0196-2413-40f1-a690-d63ad03c924b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 243: Which Came First, the BRs or the EVGs?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ac15a28-6726-4c38-949a-457e4b62e90e/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:32</itunes:duration>
      <itunes:summary>Many people don&apos;t realize that the CA/Browser Forum&apos;s Baseline Requirements actually came LATER THAN the Extended Validation Guidelines. In this episode we explain how this seemly backward turn of events came about and what it says about how online trust has evolved over the past few decades.</itunes:summary>
      <itunes:subtitle>Many people don&apos;t realize that the CA/Browser Forum&apos;s Baseline Requirements actually came LATER THAN the Extended Validation Guidelines. In this episode we explain how this seemly backward turn of events came about and what it says about how online trust has evolved over the past few decades.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>161</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1345249654</guid>
      <title>Root Causes 242: Let&apos;s Encrypt Founder Peter Eckersley Passes</title>
      <description><![CDATA[<p>Electronic Frontier Foundation member and Let's Encrypt co-founder Peter Eckersley passed away recently at a young age. In this episode we pay respect to Peter's memory and his many contributions, including ACME, Certbot, and Let's Encrypt.</p>
]]></description>
      <pubDate>Fri, 16 Sep 2022 18:47:20 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Electronic Frontier Foundation member and Let's Encrypt co-founder Peter Eckersley passed away recently at a young age. In this episode we pay respect to Peter's memory and his many contributions, including ACME, Certbot, and Let's Encrypt.</p>
]]></content:encoded>
      <enclosure length="6801787" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cd86dc06-cb48-4d77-b4c9-04ef0e1881dc/audio/035d5db5-3459-4f2c-898c-e2afebd479a8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 242: Let&apos;s Encrypt Founder Peter Eckersley Passes</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cd86dc06-cb48-4d77-b4c9-04ef0e1881dc/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>Electronic Frontier Foundation member and Let&apos;s Encrypt co-founder Peter Eckersley passed away recently at a young age. In this episode we pay respect to Peter&apos;s memory and his many contributions, including ACME, Certbot, and Let&apos;s Encrypt.</itunes:summary>
      <itunes:subtitle>Electronic Frontier Foundation member and Let&apos;s Encrypt co-founder Peter Eckersley passed away recently at a young age. In this episode we pay respect to Peter&apos;s memory and his many contributions, including ACME, Certbot, and Let&apos;s Encrypt.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>160</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1342572652</guid>
      <title>Root Causes 241: Is China Outspending the West in Quantum Computing?</title>
      <description><![CDATA[<p>A December 2021 report appears to indicate that China as vastly outspending Western countries in quantum computing. In this episode we examine this claim, including the role of private industry as opposed to government funding, the importance of international cooperation, and the vast implications of winning the race for quantum computing.</p>
]]></description>
      <pubDate>Mon, 12 Sep 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A December 2021 report appears to indicate that China as vastly outspending Western countries in quantum computing. In this episode we examine this claim, including the role of private industry as opposed to government funding, the importance of international cooperation, and the vast implications of winning the race for quantum computing.</p>
]]></content:encoded>
      <enclosure length="19521618" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/acbdf601-bf3b-47af-b93e-560c3b8924d0/audio/1b5877fa-2de0-4260-8901-fd367e1477ee/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 241: Is China Outspending the West in Quantum Computing?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/acbdf601-bf3b-47af-b93e-560c3b8924d0/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:19</itunes:duration>
      <itunes:summary>A December 2021 report appears to indicate that China as vastly outspending Western countries in quantum computing. In this episode we examine this claim, including the role of private industry as opposed to government funding, the importance of international cooperation, and the vast implications of winning the race for quantum computing.</itunes:summary>
      <itunes:subtitle>A December 2021 report appears to indicate that China as vastly outspending Western countries in quantum computing. In this episode we examine this claim, including the role of private industry as opposed to government funding, the importance of international cooperation, and the vast implications of winning the race for quantum computing.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>159</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1339575196</guid>
      <title>Root Causes 240: Hyundai Production Private Key Found in How-to Manual</title>
      <description><![CDATA[<p>A white hat researcher recently defeated a production automobile's PKI by searching for the private key on Google. Join us as we describe the implementation error making this possible and how it might have come about.</p>
]]></description>
      <pubDate>Tue, 6 Sep 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A white hat researcher recently defeated a production automobile's PKI by searching for the private key on Google. Join us as we describe the implementation error making this possible and how it might have come about.</p>
]]></content:encoded>
      <enclosure length="15039811" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2caf41b2-7e1b-4701-ae5f-c4710f0357d9/audio/d293370d-8f0d-4483-bdfe-795e9435882b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 240: Hyundai Production Private Key Found in How-to Manual</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2caf41b2-7e1b-4701-ae5f-c4710f0357d9/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:39</itunes:duration>
      <itunes:summary>A white hat researcher recently defeated a production automobile&apos;s PKI by searching for the private key on Google. Join us as we describe the implementation error making this possible and how it might have come about.</itunes:summary>
      <itunes:subtitle>A white hat researcher recently defeated a production automobile&apos;s PKI by searching for the private key on Google. Join us as we describe the implementation error making this possible and how it might have come about.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1333538782</guid>
      <title>Root Causes 239: Post-quantum Cryptography Candidate SIKE Defeated</title>
      <description><![CDATA[<p>NIST's round four post-quantum crypto candidate SIKE (Supersingular Isogeny Key Encapsulation) has been defeated and is now out of consideration.  In this episode we explain isogeny cryptography, why NIST is seeking additional candidates, and why failures of this kind are expected and healthy for PQC.</p>
]]></description>
      <pubDate>Sun, 28 Aug 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST's round four post-quantum crypto candidate SIKE (Supersingular Isogeny Key Encapsulation) has been defeated and is now out of consideration.  In this episode we explain isogeny cryptography, why NIST is seeking additional candidates, and why failures of this kind are expected and healthy for PQC.</p>
]]></content:encoded>
      <enclosure length="16813892" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a05b9852-7e5e-4202-a344-d420d8e5a2ba/audio/ff184d7b-d946-4f93-ba96-3fc9afc658f5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 239: Post-quantum Cryptography Candidate SIKE Defeated</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a05b9852-7e5e-4202-a344-d420d8e5a2ba/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:30</itunes:duration>
      <itunes:summary>NIST&apos;s round four post-quantum crypto candidate SIKE (Supersingular Isogeny Key Encapsulation) has been defeated and is now out of consideration.  In this episode we explain isogeny cryptography, why NIST is seeking additional candidates, and why failures of this kind are expected and healthy for PQC.</itunes:summary>
      <itunes:subtitle>NIST&apos;s round four post-quantum crypto candidate SIKE (Supersingular Isogeny Key Encapsulation) has been defeated and is now out of consideration.  In this episode we explain isogeny cryptography, why NIST is seeking additional candidates, and why failures of this kind are expected and healthy for PQC.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>157</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1324503661</guid>
      <title>Root Causes 238: Tim&apos;s Big Phishing Adventure</title>
      <description><![CDATA[<p>In a personally unprecedented occurrence, Tim's identity as a Sectigo executive is being used in a &quot;waterholing&quot; phishing scam intended to raid job seekers' bank accounts. We describe what is going on, how we found out, and the challenges in combatting such an attack.</p>
]]></description>
      <pubDate>Mon, 15 Aug 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In a personally unprecedented occurrence, Tim's identity as a Sectigo executive is being used in a &quot;waterholing&quot; phishing scam intended to raid job seekers' bank accounts. We describe what is going on, how we found out, and the challenges in combatting such an attack.</p>
]]></content:encoded>
      <enclosure length="16175035" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5013a962-9cd6-42bc-8d20-e4a8a84a37f3/audio/34285adc-246e-406d-b043-ed6fed8a7cea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 238: Tim&apos;s Big Phishing Adventure</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5013a962-9cd6-42bc-8d20-e4a8a84a37f3/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:50</itunes:duration>
      <itunes:summary>In a personally unprecedented occurrence, Tim&apos;s identity as a Sectigo executive is being used in a &quot;waterholing&quot; phishing scam intended to raid job seekers&apos; bank accounts. We describe what is going on, how we found out, and the challenges in combatting such an attack.</itunes:summary>
      <itunes:subtitle>In a personally unprecedented occurrence, Tim&apos;s identity as a Sectigo executive is being used in a &quot;waterholing&quot; phishing scam intended to raid job seekers&apos; bank accounts. We describe what is going on, how we found out, and the challenges in combatting such an attack.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>156</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1321683601</guid>
      <title>Root Causes 237: Why Mozilla Is So Important to CAs</title>
      <description><![CDATA[<p>Mozilla is a highly important to the world of public certificates, with influence beyond what the Firefox browser market share would suggest.  In this episode we examine the historical reasons for this influence and the mechanisms that maintain that influence today.</p>
]]></description>
      <pubDate>Wed, 10 Aug 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Mozilla is a highly important to the world of public certificates, with influence beyond what the Firefox browser market share would suggest.  In this episode we examine the historical reasons for this influence and the mechanisms that maintain that influence today.</p>
]]></content:encoded>
      <enclosure length="11460541" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/66717e0d-b88e-4564-88b4-f575ed183d5c/audio/92cadd58-1cd4-4bc9-8f9d-f5425dc94d71/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 237: Why Mozilla Is So Important to CAs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/66717e0d-b88e-4564-88b4-f575ed183d5c/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:55</itunes:duration>
      <itunes:summary>Mozilla is a highly important to the world of public certificates, with influence beyond what the Firefox browser market share would suggest.  In this episode we examine the historical reasons for this influence and the mechanisms that maintain that influence today.</itunes:summary>
      <itunes:subtitle>Mozilla is a highly important to the world of public certificates, with influence beyond what the Firefox browser market share would suggest.  In this episode we examine the historical reasons for this influence and the mechanisms that maintain that influence today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1318024705</guid>
      <title>Root Causes 236: Active Directory Patch Knocks Out Non-MS Identity Consumers</title>
      <description><![CDATA[<p>A recently revealed vulnerability in Active Directory made it possible for an attacker to escalate privileges inappropriately.  Microsoft's responded with a patch in May 2022, which unfortunately has forced a difficult workaround for many common software components beyond Active Directory that will otherwise be incapable of working with AD identities. In this episode we explain what his happening, how it came about, and the broader lessons for PKI owners.</p>
]]></description>
      <pubDate>Thu, 4 Aug 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recently revealed vulnerability in Active Directory made it possible for an attacker to escalate privileges inappropriately.  Microsoft's responded with a patch in May 2022, which unfortunately has forced a difficult workaround for many common software components beyond Active Directory that will otherwise be incapable of working with AD identities. In this episode we explain what his happening, how it came about, and the broader lessons for PKI owners.</p>
]]></content:encoded>
      <enclosure length="12132648" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4c4d880b-85d9-4519-9a02-603579b28c62/audio/d2101935-0c3d-4e07-9455-5336ee456fd3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 236: Active Directory Patch Knocks Out Non-MS Identity Consumers</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4c4d880b-85d9-4519-9a02-603579b28c62/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:37</itunes:duration>
      <itunes:summary>A recently revealed vulnerability in Active Directory made it possible for an attacker to escalate privileges inappropriately.  Microsoft&apos;s responded with a patch in May 2022, which unfortunately has forced a difficult workaround for many common software components beyond Active Directory that will otherwise be incapable of working with AD identities. In this episode we explain what his happening, how it came about, and the broader lessons for PKI owners.</itunes:summary>
      <itunes:subtitle>A recently revealed vulnerability in Active Directory made it possible for an attacker to escalate privileges inappropriately.  Microsoft&apos;s responded with a patch in May 2022, which unfortunately has forced a difficult workaround for many common software components beyond Active Directory that will otherwise be incapable of working with AD identities. In this episode we explain what his happening, how it came about, and the broader lessons for PKI owners.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>154</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1312923346</guid>
      <title>Root Causes 235: What Is Lattice-based Cryptography?</title>
      <description><![CDATA[<p>The recent winners of the NIST post-quantum cryptography contest are strongly focused on lattice-based encryption.  In this episode we explain at a high level what this cryptographic approach entails and why lattice-based algorithms fared so well in the NIST search.</p>
]]></description>
      <pubDate>Tue, 26 Jul 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recent winners of the NIST post-quantum cryptography contest are strongly focused on lattice-based encryption.  In this episode we explain at a high level what this cryptographic approach entails and why lattice-based algorithms fared so well in the NIST search.</p>
]]></content:encoded>
      <enclosure length="25346107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ba76e550-1a66-4df5-b60b-ccfd6a078c3a/audio/99e1a095-70dd-42de-9ee6-8ed757dad42d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 235: What Is Lattice-based Cryptography?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ba76e550-1a66-4df5-b60b-ccfd6a078c3a/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:23</itunes:duration>
      <itunes:summary>The recent winners of the NIST post-quantum cryptography contest are strongly focused on lattice-based encryption.  In this episode we explain at a high level what this cryptographic approach entails and why lattice-based algorithms fared so well in the NIST search.</itunes:summary>
      <itunes:subtitle>The recent winners of the NIST post-quantum cryptography contest are strongly focused on lattice-based encryption.  In this episode we explain at a high level what this cryptographic approach entails and why lattice-based algorithms fared so well in the NIST search.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>153</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1310051782</guid>
      <title>Root Causes 234: Report from the 2022 RSA Conference</title>
      <description><![CDATA[<p>The RSA Security Conference is back. In this episode we talk about what happened in 2020 and how the first post-COVID RSAC compared to earlier years, along with some of the major themes this year.</p>
]]></description>
      <pubDate>Fri, 22 Jul 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The RSA Security Conference is back. In this episode we talk about what happened in 2020 and how the first post-COVID RSAC compared to earlier years, along with some of the major themes this year.</p>
]]></content:encoded>
      <enclosure length="9832492" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/296e3188-5fb0-48fa-93c5-3ce29cf5dedd/audio/a7f939a7-3d44-4cd7-8ed1-ea7125dab969/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 234: Report from the 2022 RSA Conference</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/296e3188-5fb0-48fa-93c5-3ce29cf5dedd/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:13</itunes:duration>
      <itunes:summary>The RSA Security Conference is back. In this episode we talk about what happened in 2020 and how the first post-COVID RSAC compared to earlier years, along with some of the major themes this year.</itunes:summary>
      <itunes:subtitle>The RSA Security Conference is back. In this episode we talk about what happened in 2020 and how the first post-COVID RSAC compared to earlier years, along with some of the major themes this year.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>152</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1304694235</guid>
      <title>Root Causes 233: CISA Recommendations for Post-Quantum Crypto</title>
      <description><![CDATA[<p>In coordination with NIST's announcement of its new post-quantum cryptographic algorithm contest winners, the Cybersecurity and Infrastructure Security Agency released a bulletin listing six key actions for IT to commence now.  We read out these six actions and put them in context.</p>
]]></description>
      <pubDate>Tue, 12 Jul 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In coordination with NIST's announcement of its new post-quantum cryptographic algorithm contest winners, the Cybersecurity and Infrastructure Security Agency released a bulletin listing six key actions for IT to commence now.  We read out these six actions and put them in context.</p>
]]></content:encoded>
      <enclosure length="24436024" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7b618cc1-882f-4428-aa37-9280ceb9213d/audio/66933ae8-4831-4408-b2e7-c91a9238caa5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 233: CISA Recommendations for Post-Quantum Crypto</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7b618cc1-882f-4428-aa37-9280ceb9213d/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:26</itunes:duration>
      <itunes:summary>In coordination with NIST&apos;s announcement of its new post-quantum cryptographic algorithm contest winners, the Cybersecurity and Infrastructure Security Agency released a bulletin listing six key actions for IT to commence now.  We read out these six actions and put them in context.</itunes:summary>
      <itunes:subtitle>In coordination with NIST&apos;s announcement of its new post-quantum cryptographic algorithm contest winners, the Cybersecurity and Infrastructure Security Agency released a bulletin listing six key actions for IT to commence now.  We read out these six actions and put them in context.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>151</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1301993602</guid>
      <title>Root Causes 232: NIST Announces Post Quantum Crypto Selections</title>
      <description><![CDATA[<p>NIST has announced its winning algorithms for round 3 of its post-quantum cryptography &quot;contest.&quot; Join us as we name the winning algorithms and why they were chosen.  We discuss the continuing effort to arrive at additional algorithms, and we talk about the next steps coming out of this announcement.</p>
]]></description>
      <pubDate>Fri, 8 Jul 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>NIST has announced its winning algorithms for round 3 of its post-quantum cryptography &quot;contest.&quot; Join us as we name the winning algorithms and why they were chosen.  We discuss the continuing effort to arrive at additional algorithms, and we talk about the next steps coming out of this announcement.</p>
]]></content:encoded>
      <enclosure length="18045988" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/04bffe2e-7302-4247-a29c-0702919da652/audio/4e13fa92-ceca-4425-ab77-ae15983befb7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 232: NIST Announces Post Quantum Crypto Selections</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/04bffe2e-7302-4247-a29c-0702919da652/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:47</itunes:duration>
      <itunes:summary>NIST has announced its winning algorithms for round 3 of its post-quantum cryptography &quot;contest.&quot; Join us as we name the winning algorithms and why they were chosen.  We discuss the continuing effort to arrive at additional algorithms, and we talk about the next steps coming out of this announcement.</itunes:summary>
      <itunes:subtitle>NIST has announced its winning algorithms for round 3 of its post-quantum cryptography &quot;contest.&quot; Join us as we name the winning algorithms and why they were chosen.  We discuss the continuing effort to arrive at additional algorithms, and we talk about the next steps coming out of this announcement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>150</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1300771300</guid>
      <title>Root Causes 231: What Is FIDO?</title>
      <description><![CDATA[<p>Recent announcements about consumer passwordless authentication build on standards like FIDO and WebAuthn.  In this episode we explain device-centric authentication, the FIDO Alliance, and how it all works.</p>
]]></description>
      <pubDate>Wed, 6 Jul 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent announcements about consumer passwordless authentication build on standards like FIDO and WebAuthn.  In this episode we explain device-centric authentication, the FIDO Alliance, and how it all works.</p>
]]></content:encoded>
      <enclosure length="23220162" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d250e1aa-14e7-4458-9dc6-4cd82e98d383/audio/d25cd09b-ec87-4d62-bed3-cd1da684ab18/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 231: What Is FIDO?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d250e1aa-14e7-4458-9dc6-4cd82e98d383/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:10</itunes:duration>
      <itunes:summary>Recent announcements about consumer passwordless authentication build on standards like FIDO and WebAuthn.  In this episode we explain device-centric authentication, the FIDO Alliance, and how it all works.</itunes:summary>
      <itunes:subtitle>Recent announcements about consumer passwordless authentication build on standards like FIDO and WebAuthn.  In this episode we explain device-centric authentication, the FIDO Alliance, and how it all works.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1297458274</guid>
      <title>Root Causes 230: What Is Apple Passkey?</title>
      <description><![CDATA[<p>Apple recently announced its Passkey functionality, which will allow passwordless authentication between Apple devices and supporting web services through key exchange. In this episode we discuss how this works, the user experience, the significance of FIDO and WebAuthn, and implications for consumer-facing sites.</p>
]]></description>
      <pubDate>Thu, 30 Jun 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple recently announced its Passkey functionality, which will allow passwordless authentication between Apple devices and supporting web services through key exchange. In this episode we discuss how this works, the user experience, the significance of FIDO and WebAuthn, and implications for consumer-facing sites.</p>
]]></content:encoded>
      <enclosure length="15278869" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/05fdadf8-da60-4974-a202-23fb03ed0226/audio/8235c9ce-0f0d-4fd6-bb99-0cf76b9fb527/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 230: What Is Apple Passkey?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/05fdadf8-da60-4974-a202-23fb03ed0226/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:54</itunes:duration>
      <itunes:summary>Apple recently announced its Passkey functionality, which will allow passwordless authentication between Apple devices and supporting web services through key exchange. In this episode we discuss how this works, the user experience, the significance of FIDO and WebAuthn, and implications for consumer-facing sites.</itunes:summary>
      <itunes:subtitle>Apple recently announced its Passkey functionality, which will allow passwordless authentication between Apple devices and supporting web services through key exchange. In this episode we discuss how this works, the user experience, the significance of FIDO and WebAuthn, and implications for consumer-facing sites.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>148</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1283772628</guid>
      <title>Root Causes 229: Browsing Collectives and the 80/20 Rule of Browser Privacy</title>
      <description><![CDATA[<p>In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy. We discuss data aggregation, the power of the default, decentralized blockchain identities, the death of cookies, browsing collectives, privacy browsers, and the 80/20 rule of browser entropy.</p>
]]></description>
      <pubDate>Wed, 8 Jun 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy. We discuss data aggregation, the power of the default, decentralized blockchain identities, the death of cookies, browsing collectives, privacy browsers, and the 80/20 rule of browser entropy.</p>
]]></content:encoded>
      <enclosure length="20821125" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2e2ace6a-6841-4c52-8cb1-16aba5e51f01/audio/31dc0be7-cdcf-4796-9dbb-8c8f96d3fa76/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 229: Browsing Collectives and the 80/20 Rule of Browser Privacy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2e2ace6a-6841-4c52-8cb1-16aba5e51f01/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:40</itunes:duration>
      <itunes:summary>In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy. We discuss data aggregation, the power of the default, decentralized blockchain identities, the death of cookies, browsing collectives, privacy browsers, and the 80/20 rule of browser entropy.</itunes:summary>
      <itunes:subtitle>In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy. We discuss data aggregation, the power of the default, decentralized blockchain identities, the death of cookies, browsing collectives, privacy browsers, and the 80/20 rule of browser entropy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>147</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1279293649</guid>
      <title>Root Causes 228: Getting the FLoC out of Here</title>
      <description><![CDATA[<p>In a follow-up to our recent episode on cookies and browser tracking, we discuss Google's Federated Learning of Cohorts (FLoC) initiative, why it failed as a response, and other directions the industry is looking in.</p>
]]></description>
      <pubDate>Tue, 31 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In a follow-up to our recent episode on cookies and browser tracking, we discuss Google's Federated Learning of Cohorts (FLoC) initiative, why it failed as a response, and other directions the industry is looking in.</p>
]]></content:encoded>
      <enclosure length="13798531" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/31679374-9acb-4dba-9b07-5fa569c73d66/audio/96be51c7-b02e-40c9-a6c7-e3cd26b105f9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 228: Getting the FLoC out of Here</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/31679374-9acb-4dba-9b07-5fa569c73d66/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:21</itunes:duration>
      <itunes:summary>In a follow-up to our recent episode on cookies and browser tracking, we discuss Google&apos;s Federated Learning of Cohorts (FLoC) initiative, why it failed as a response, and other directions the industry is looking in.</itunes:summary>
      <itunes:subtitle>In a follow-up to our recent episode on cookies and browser tracking, we discuss Google&apos;s Federated Learning of Cohorts (FLoC) initiative, why it failed as a response, and other directions the industry is looking in.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>146</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1276473097</guid>
      <title>Root Causes 227: Let&apos;s Talk About Cookies</title>
      <description><![CDATA[<p>In this episode we explain the fundamentals of cookies and why, despite their obvious benefits, they present troublesome privacy concerns. We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.</p>
]]></description>
      <pubDate>Fri, 27 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain the fundamentals of cookies and why, despite their obvious benefits, they present troublesome privacy concerns. We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.</p>
]]></content:encoded>
      <enclosure length="22617102" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/63cbe284-dae1-4d16-93a4-b3210c553ea3/audio/0526975f-a947-4e70-b464-c28d332b2522/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 227: Let&apos;s Talk About Cookies</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/63cbe284-dae1-4d16-93a4-b3210c553ea3/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:33</itunes:duration>
      <itunes:summary>In this episode we explain the fundamentals of cookies and why, despite their obvious benefits, they present troublesome privacy concerns. We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.</itunes:summary>
      <itunes:subtitle>In this episode we explain the fundamentals of cookies and why, despite their obvious benefits, they present troublesome privacy concerns. We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>145</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1274548675</guid>
      <title>Root Causes 226: The Six Benefits of SSH Certificates</title>
      <description><![CDATA[<p>In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.</p>
]]></description>
      <pubDate>Tue, 24 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.</p>
]]></content:encoded>
      <enclosure length="20623578" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3e57678f-5064-4715-ba02-9a43ec08196c/audio/a1834f33-6f28-416b-9386-56518c1089fe/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 226: The Six Benefits of SSH Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3e57678f-5064-4715-ba02-9a43ec08196c/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:28</itunes:duration>
      <itunes:summary>In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.</itunes:summary>
      <itunes:subtitle>In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>144</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1272236584</guid>
      <title>Root Causes 225: The Difference Between Relying Parties and Certificate Consumers</title>
      <description><![CDATA[<p>Despite the similarity in their names, in the world of digital certificates a Relying Party and a Certificate Consumer are very different things.  In this episode we define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.</p>
]]></description>
      <pubDate>Thu, 19 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Despite the similarity in their names, in the world of digital certificates a Relying Party and a Certificate Consumer are very different things.  In this episode we define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.</p>
]]></content:encoded>
      <enclosure length="14697691" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5dc1dc46-38bb-4014-b5df-2ed02432fe5b/audio/08ee1bb3-cb4d-4e4f-9608-eeb563e6aa47/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 225: The Difference Between Relying Parties and Certificate Consumers</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5dc1dc46-38bb-4014-b5df-2ed02432fe5b/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:18</itunes:duration>
      <itunes:summary>Despite the similarity in their names, in the world of digital certificates a Relying Party and a Certificate Consumer are very different things.  In this episode we define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.</itunes:summary>
      <itunes:subtitle>Despite the similarity in their names, in the world of digital certificates a Relying Party and a Certificate Consumer are very different things.  In this episode we define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>143</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1270122652</guid>
      <title>Root Causes 224: The Five Problems with SSH Keys</title>
      <description><![CDATA[<p>In this follow-on to our earlier episode explaining SSH keys, we discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.</p>
]]></description>
      <pubDate>Tue, 17 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this follow-on to our earlier episode explaining SSH keys, we discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.</p>
]]></content:encoded>
      <enclosure length="18501619" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ba8bc1c6-e86f-4a28-8056-ec0842835448/audio/b5740e4b-6b68-43f0-9948-a112bf758d7e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 224: The Five Problems with SSH Keys</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ba8bc1c6-e86f-4a28-8056-ec0842835448/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:15</itunes:duration>
      <itunes:summary>In this follow-on to our earlier episode explaining SSH keys, we discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.</itunes:summary>
      <itunes:subtitle>In this follow-on to our earlier episode explaining SSH keys, we discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>142</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1267828354</guid>
      <title>Root Causes 223: CT Log-Enabled Attacks on WordPress Sites</title>
      <description><![CDATA[<p>Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.  This attack is novel in how it exploits Certificate Transparency information to identify likely targets.  In this episode we explain what is happening and why it's noteworthy.</p>
]]></description>
      <pubDate>Wed, 11 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.  This attack is novel in how it exploits Certificate Transparency information to identify likely targets.  In this episode we explain what is happening and why it's noteworthy.</p>
]]></content:encoded>
      <enclosure length="14152137" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8f089358-b192-4305-8a73-24c933280496/audio/c9791e88-1280-48b1-a8a3-5329a134283a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 223: CT Log-Enabled Attacks on WordPress Sites</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8f089358-b192-4305-8a73-24c933280496/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:43</itunes:duration>
      <itunes:summary>Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.  This attack is novel in how it exploits Certificate Transparency information to identify likely targets.  In this episode we explain what is happening and why it&apos;s noteworthy.</itunes:summary>
      <itunes:subtitle>Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.  This attack is novel in how it exploits Certificate Transparency information to identify likely targets.  In this episode we explain what is happening and why it&apos;s noteworthy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>141</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1266343156</guid>
      <title>Root Causes 222: Consolidation and PKI Solutions</title>
      <description><![CDATA[<p>Vendor consolidation is an important topic in IT security. As the scope and variety of threats continues to increase, we have seen a proliferation of point solutions and features, and a resulting desire to reduce that vendor footprint or at least facilitate using them together. In this episode we discuss this trend and how it specifically affects PKI and digital certificates.</p>
]]></description>
      <pubDate>Wed, 11 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Vendor consolidation is an important topic in IT security. As the scope and variety of threats continues to increase, we have seen a proliferation of point solutions and features, and a resulting desire to reduce that vendor footprint or at least facilitate using them together. In this episode we discuss this trend and how it specifically affects PKI and digital certificates.</p>
]]></content:encoded>
      <enclosure length="9926667" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/908eaafe-7771-4872-8077-2977f2f3ad0d/audio/1c8e41ae-5262-44e8-858d-e92425f2c0f1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 222: Consolidation and PKI Solutions</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/908eaafe-7771-4872-8077-2977f2f3ad0d/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:19</itunes:duration>
      <itunes:summary>Vendor consolidation is an important topic in IT security. As the scope and variety of threats continues to increase, we have seen a proliferation of point solutions and features, and a resulting desire to reduce that vendor footprint or at least facilitate using them together. In this episode we discuss this trend and how it specifically affects PKI and digital certificates.</itunes:summary>
      <itunes:subtitle>Vendor consolidation is an important topic in IT security. As the scope and variety of threats continues to increase, we have seen a proliferation of point solutions and features, and a resulting desire to reduce that vendor footprint or at least facilitate using them together. In this episode we discuss this trend and how it specifically affects PKI and digital certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>140</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1262883439</guid>
      <title>Root Causes 221: What Are SSH Keys?</title>
      <description><![CDATA[<p>SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. In this first of three episodes we explain what these keys are and how they're used.</p>
]]></description>
      <pubDate>Wed, 4 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. In this first of three episodes we explain what these keys are and how they're used.</p>
]]></content:encoded>
      <enclosure length="14332401" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b29260f9-5799-4a23-adf4-8e0125f3e19e/audio/63c3a385-580a-4903-a2b6-cc9b9c4368f9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 221: What Are SSH Keys?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b29260f9-5799-4a23-adf4-8e0125f3e19e/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:55</itunes:duration>
      <itunes:summary>SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. In this first of three episodes we explain what these keys are and how they&apos;re used.</itunes:summary>
      <itunes:subtitle>SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. In this first of three episodes we explain what these keys are and how they&apos;re used.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>139</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1261038070</guid>
      <title>Root Causes 220: The Difference Between OTP and Passwordless</title>
      <description><![CDATA[<p>&quot;Passwordless&quot; is a hot term in the industry, and as a result many technology vendors are attaching their solutions to this term. In this episode we clarify the difference between OTP services and passwordless authentication.</p>
]]></description>
      <pubDate>Mon, 2 May 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>&quot;Passwordless&quot; is a hot term in the industry, and as a result many technology vendors are attaching their solutions to this term. In this episode we clarify the difference between OTP services and passwordless authentication.</p>
]]></content:encoded>
      <enclosure length="13520354" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4fcbeb8-03b5-4d7b-b9b8-7cb7b760b201/audio/8a6cb913-ee76-4509-8549-117001857973/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 220: The Difference Between OTP and Passwordless</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4fcbeb8-03b5-4d7b-b9b8-7cb7b760b201/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:04</itunes:duration>
      <itunes:summary>&quot;Passwordless&quot; is a hot term in the industry, and as a result many technology vendors are attaching their solutions to this term. In this episode we clarify the difference between OTP services and passwordless authentication.</itunes:summary>
      <itunes:subtitle>&quot;Passwordless&quot; is a hot term in the industry, and as a result many technology vendors are attaching their solutions to this term. In this episode we clarify the difference between OTP services and passwordless authentication.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>138</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1258102672</guid>
      <title>Root Causes 219: New Quantum Cryptography Legislation Introduced</title>
      <description><![CDATA[<p>New proposed legislation in the US House of Representatives mandates that federal agencies must begin preparation for using the new quantum resistant cryptographic algorithms selected by NIST. This represents a major development in building a quantum safe digital world.  In this episode we explain the proposed legislation and it's consequences.</p>
]]></description>
      <pubDate>Tue, 26 Apr 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>New proposed legislation in the US House of Representatives mandates that federal agencies must begin preparation for using the new quantum resistant cryptographic algorithms selected by NIST. This represents a major development in building a quantum safe digital world.  In this episode we explain the proposed legislation and it's consequences.</p>
]]></content:encoded>
      <enclosure length="11677733" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ef1b0685-056d-457c-a978-887d950bc830/audio/de90d4be-5766-4f8e-af5a-bebe4107f91d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 219: New Quantum Cryptography Legislation Introduced</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ef1b0685-056d-457c-a978-887d950bc830/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:09</itunes:duration>
      <itunes:summary>New proposed legislation in the US House of Representatives mandates that federal agencies must begin preparation for using the new quantum resistant cryptographic algorithms selected by NIST. This represents a major development in building a quantum safe digital world.  In this episode we explain the proposed legislation and it&apos;s consequences.</itunes:summary>
      <itunes:subtitle>New proposed legislation in the US House of Representatives mandates that federal agencies must begin preparation for using the new quantum resistant cryptographic algorithms selected by NIST. This represents a major development in building a quantum safe digital world.  In this episode we explain the proposed legislation and it&apos;s consequences.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>137</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1253781097</guid>
      <title>Root Causes 218: PKI Nomenclature Oddities</title>
      <description><![CDATA[<p>Every technology space has its jargon. In this episode we go over some of the interesting, ambiguous, or amusing terms that are specific to the PKI and digital certificates industry.</p>
]]></description>
      <pubDate>Wed, 20 Apr 2022 17:47:17 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Every technology space has its jargon. In this episode we go over some of the interesting, ambiguous, or amusing terms that are specific to the PKI and digital certificates industry.</p>
]]></content:encoded>
      <enclosure length="29058279" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/11d15138-28e9-4ac8-a812-76c389472a3f/audio/b6c1260b-469c-4319-bcc8-31772ff92687/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 218: PKI Nomenclature Oddities</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/11d15138-28e9-4ac8-a812-76c389472a3f/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:15</itunes:duration>
      <itunes:summary>Every technology space has its jargon. In this episode we go over some of the interesting, ambiguous, or amusing terms that are specific to the PKI and digital certificates industry.</itunes:summary>
      <itunes:subtitle>Every technology space has its jargon. In this episode we go over some of the interesting, ambiguous, or amusing terms that are specific to the PKI and digital certificates industry.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>136</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1250269009</guid>
      <title>Root Causes 217: What&apos;s the Deal with the Recent Okta Security Breach?</title>
      <description><![CDATA[<p>In March the LAPSIS$ hacking group convincingly announced a breach of Okta systems, potentially exposing Okta customers to additional compromise. Despite Okta's initial statements to the contrary, it ultimately turned out that up to 366 Okta customers may be affected. Our hosts walk through the events of the attack, how it unfolded over time, and how this breach was revealed.</p>
]]></description>
      <pubDate>Thu, 14 Apr 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In March the LAPSIS$ hacking group convincingly announced a breach of Okta systems, potentially exposing Okta customers to additional compromise. Despite Okta's initial statements to the contrary, it ultimately turned out that up to 366 Okta customers may be affected. Our hosts walk through the events of the attack, how it unfolded over time, and how this breach was revealed.</p>
]]></content:encoded>
      <enclosure length="23509710" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ebac802-8f3d-4e64-b0b6-8c6338847652/audio/07465227-0324-4dee-82ca-38bb1a50ba3a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 217: What&apos;s the Deal with the Recent Okta Security Breach?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ebac802-8f3d-4e64-b0b6-8c6338847652/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:28</itunes:duration>
      <itunes:summary>In March the LAPSIS$ hacking group convincingly announced a breach of Okta systems, potentially exposing Okta customers to additional compromise. Despite Okta&apos;s initial statements to the contrary, it ultimately turned out that up to 366 Okta customers may be affected. Our hosts walk through the events of the attack, how it unfolded over time, and how this breach was revealed.</itunes:summary>
      <itunes:subtitle>In March the LAPSIS$ hacking group convincingly announced a breach of Okta systems, potentially exposing Okta customers to additional compromise. Despite Okta&apos;s initial statements to the contrary, it ultimately turned out that up to 366 Okta customers may be affected. Our hosts walk through the events of the attack, how it unfolded over time, and how this breach was revealed.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>135</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1248464884</guid>
      <title>Root Causes 216: What Is crt.sh?</title>
      <description><![CDATA[<p>One of the foundational tools for monitoring and understanding public SSL certificates is crt.sh, created and maintained by Sectigo's own Rob Stradling. In this episode our hosts explain what crt.sh does and why it is so popular among SSL industry watchers.</p>
]]></description>
      <pubDate>Sun, 10 Apr 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One of the foundational tools for monitoring and understanding public SSL certificates is crt.sh, created and maintained by Sectigo's own Rob Stradling. In this episode our hosts explain what crt.sh does and why it is so popular among SSL industry watchers.</p>
]]></content:encoded>
      <enclosure length="10407616" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6d7c0ef3-74c6-42ed-a1f2-6673e6761fbd/audio/d69ca892-e07b-4aeb-a772-a905799230db/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 216: What Is crt.sh?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6d7c0ef3-74c6-42ed-a1f2-6673e6761fbd/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:49</itunes:duration>
      <itunes:summary>One of the foundational tools for monitoring and understanding public SSL certificates is crt.sh, created and maintained by Sectigo&apos;s own Rob Stradling. In this episode our hosts explain what crt.sh does and why it is so popular among SSL industry watchers.</itunes:summary>
      <itunes:subtitle>One of the foundational tools for monitoring and understanding public SSL certificates is crt.sh, created and maintained by Sectigo&apos;s own Rob Stradling. In this episode our hosts explain what crt.sh does and why it is so popular among SSL industry watchers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1246752205</guid>
      <title>Root Causes 215: Passwordless Authentication and Legacy Systems</title>
      <description><![CDATA[<p>Organizations seeking to use passwordless authentication frequently must deal with legacy systems that cannot support this scheme. In this episode we explain why that occurs and detail the steps organizations can take to mitigate the effect of legacy systems.</p>
]]></description>
      <pubDate>Fri, 8 Apr 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Organizations seeking to use passwordless authentication frequently must deal with legacy systems that cannot support this scheme. In this episode we explain why that occurs and detail the steps organizations can take to mitigate the effect of legacy systems.</p>
]]></content:encoded>
      <enclosure length="22659647" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/797bd1ea-7fa5-49d4-8653-855f4157a263/audio/b40cd898-c176-4422-986d-5fcf0de07c6a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 215: Passwordless Authentication and Legacy Systems</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/797bd1ea-7fa5-49d4-8653-855f4157a263/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:35</itunes:duration>
      <itunes:summary>Organizations seeking to use passwordless authentication frequently must deal with legacy systems that cannot support this scheme. In this episode we explain why that occurs and detail the steps organizations can take to mitigate the effect of legacy systems.</itunes:summary>
      <itunes:subtitle>Organizations seeking to use passwordless authentication frequently must deal with legacy systems that cannot support this scheme. In this episode we explain why that occurs and detail the steps organizations can take to mitigate the effect of legacy systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>133</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1244783002</guid>
      <title>Root Causes 214: New DUO MFA Flaw Explained</title>
      <description><![CDATA[<p>A recent FBI warning cautions organizations about exploits based on misconfigured DUO MFA, which exploits weaknesses in Active Directory to provision credentials on DUO for malicious parties.  This is an unusual story in several ways, including the fact that the exploit is based on a configuration error and that it's specific to a single, popular SaaS offering.  Our hosts explain this exploit and why it is noteworthy.</p>
]]></description>
      <pubDate>Tue, 5 Apr 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recent FBI warning cautions organizations about exploits based on misconfigured DUO MFA, which exploits weaknesses in Active Directory to provision credentials on DUO for malicious parties.  This is an unusual story in several ways, including the fact that the exploit is based on a configuration error and that it's specific to a single, popular SaaS offering.  Our hosts explain this exploit and why it is noteworthy.</p>
]]></content:encoded>
      <enclosure length="10839042" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7c87708c-4e78-4f03-b648-7f0161550a52/audio/0fe7bb67-9516-4e7e-9873-a5311e75beda/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 214: New DUO MFA Flaw Explained</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7c87708c-4e78-4f03-b648-7f0161550a52/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:16</itunes:duration>
      <itunes:summary>A recent FBI warning cautions organizations about exploits based on misconfigured DUO MFA, which exploits weaknesses in Active Directory to provision credentials on DUO for malicious parties.  This is an unusual story in several ways, including the fact that the exploit is based on a configuration error and that it&apos;s specific to a single, popular SaaS offering.  Our hosts explain this exploit and why it is noteworthy.</itunes:summary>
      <itunes:subtitle>A recent FBI warning cautions organizations about exploits based on misconfigured DUO MFA, which exploits weaknesses in Active Directory to provision credentials on DUO for malicious parties.  This is an unusual story in several ways, including the fact that the exploit is based on a configuration error and that it&apos;s specific to a single, popular SaaS offering.  Our hosts explain this exploit and why it is noteworthy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>132</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1241964406</guid>
      <title>Root Causes 213: 600-domain Phishing Attack</title>
      <description><![CDATA[<p>In this episode we describe a recent phishing campaign noteworthy for its scale, encompassing a total of 600 unique domains.  We discuss the implications of a campaign of this scale and high level of organization.</p>
]]></description>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we describe a recent phishing campaign noteworthy for its scale, encompassing a total of 600 unique domains.  We discuss the implications of a campaign of this scale and high level of organization.</p>
]]></content:encoded>
      <enclosure length="7755068" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fcd14f2f-e69f-4d74-8287-f921957c1901/audio/06fd1ee3-daf2-4923-80e3-7adf94803259/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 213: 600-domain Phishing Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fcd14f2f-e69f-4d74-8287-f921957c1901/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:04</itunes:duration>
      <itunes:summary>In this episode we describe a recent phishing campaign noteworthy for its scale, encompassing a total of 600 unique domains.  We discuss the implications of a campaign of this scale and high level of organization.</itunes:summary>
      <itunes:subtitle>In this episode we describe a recent phishing campaign noteworthy for its scale, encompassing a total of 600 unique domains.  We discuss the implications of a campaign of this scale and high level of organization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>131</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1240117351</guid>
      <title>Root Causes 212: S/MIME Limited to Three Years</title>
      <description><![CDATA[<p>On April 1 new root program requirements from Apple for S/MIME certificates go into effect, including a limitation of the allowable term to three years.  This is contrary to Apple's stated intentions last year.  In this episode the explain this change in policy and what certificate users can expect for the future.</p>
]]></description>
      <pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On April 1 new root program requirements from Apple for S/MIME certificates go into effect, including a limitation of the allowable term to three years.  This is contrary to Apple's stated intentions last year.  In this episode the explain this change in policy and what certificate users can expect for the future.</p>
]]></content:encoded>
      <enclosure length="10274567" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/509de0c8-6a55-4d65-9cc4-06f4c578abc8/audio/297cbfe2-ffc7-4f65-9925-2d43386a99b0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 212: S/MIME Limited to Three Years</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/509de0c8-6a55-4d65-9cc4-06f4c578abc8/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:41</itunes:duration>
      <itunes:summary>On April 1 new root program requirements from Apple for S/MIME certificates go into effect, including a limitation of the allowable term to three years.  This is contrary to Apple&apos;s stated intentions last year.  In this episode the explain this change in policy and what certificate users can expect for the future.</itunes:summary>
      <itunes:subtitle>On April 1 new root program requirements from Apple for S/MIME certificates go into effect, including a limitation of the allowable term to three years.  This is contrary to Apple&apos;s stated intentions last year.  In this episode the explain this change in policy and what certificate users can expect for the future.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1232119597</guid>
      <title>Root Causes 211: Does CLM  Make Wildcard and MDC Irrelevant?</title>
      <description><![CDATA[<p>Wildcard and multi-domain certificates have traditionally made administration easier for IT departments. In this episode we weigh the degree to which Certificate Lifecycle Management (CLM) renders these benefits obsolete and if these certificate types continue to be worth the increased risk they carry.</p>
]]></description>
      <pubDate>Sat, 12 Mar 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Wildcard and multi-domain certificates have traditionally made administration easier for IT departments. In this episode we weigh the degree to which Certificate Lifecycle Management (CLM) renders these benefits obsolete and if these certificate types continue to be worth the increased risk they carry.</p>
]]></content:encoded>
      <enclosure length="13663776" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/78542d8f-0415-4646-97d3-a1a7e5618a80/audio/19f21d32-0c99-4c95-b539-1f57bff2aedb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 211: Does CLM  Make Wildcard and MDC Irrelevant?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/78542d8f-0415-4646-97d3-a1a7e5618a80/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:13</itunes:duration>
      <itunes:summary>Wildcard and multi-domain certificates have traditionally made administration easier for IT departments. In this episode we weigh the degree to which Certificate Lifecycle Management (CLM) renders these benefits obsolete and if these certificate types continue to be worth the increased risk they carry.</itunes:summary>
      <itunes:subtitle>Wildcard and multi-domain certificates have traditionally made administration easier for IT departments. In this episode we weigh the degree to which Certificate Lifecycle Management (CLM) renders these benefits obsolete and if these certificate types continue to be worth the increased risk they carry.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>129</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1228718440</guid>
      <title>Root Causes 210: Living off the Land</title>
      <description><![CDATA[<p>Microsoft has deprecated support for the popular sysadmin tool WMIC. Join our hosts as they explain the security reasons behind this development and broader lessons we can learn.</p>
]]></description>
      <pubDate>Mon, 7 Mar 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Microsoft has deprecated support for the popular sysadmin tool WMIC. Join our hosts as they explain the security reasons behind this development and broader lessons we can learn.</p>
]]></content:encoded>
      <enclosure length="6285689" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5637c756-aab5-407f-b1b0-fbbc5a160986/audio/234ee981-de3c-4c28-8f96-71138d87874e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 210: Living off the Land</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5637c756-aab5-407f-b1b0-fbbc5a160986/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:32</itunes:duration>
      <itunes:summary>Microsoft has deprecated support for the popular sysadmin tool WMIC. Join our hosts as they explain the security reasons behind this development and broader lessons we can learn.</itunes:summary>
      <itunes:subtitle>Microsoft has deprecated support for the popular sysadmin tool WMIC. Join our hosts as they explain the security reasons behind this development and broader lessons we can learn.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1224660349</guid>
      <title>Root Causes 209: One-Day Deployment of Certificate Lifecycle Management (CLM) Platforms</title>
      <description><![CDATA[<p>For any Certificate Lifecycle Management platform to succeed, effective deployment is essential. Our hosts are joined by Sectigo SVP of Global Sales Jennifer Binet who describes the optimal onboarding process, step by step.  Jennifer discusses adding use cases over time, streamlining the contracting process, and getting to full automation for all certificates.</p>
]]></description>
      <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For any Certificate Lifecycle Management platform to succeed, effective deployment is essential. Our hosts are joined by Sectigo SVP of Global Sales Jennifer Binet who describes the optimal onboarding process, step by step.  Jennifer discusses adding use cases over time, streamlining the contracting process, and getting to full automation for all certificates.</p>
]]></content:encoded>
      <enclosure length="19746227" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/111f798a-8c47-497f-838c-724ebde6b11b/audio/f24a7888-9421-49f9-a442-dfd58ac8b0c9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 209: One-Day Deployment of Certificate Lifecycle Management (CLM) Platforms</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/111f798a-8c47-497f-838c-724ebde6b11b/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:33</itunes:duration>
      <itunes:summary>For any Certificate Lifecycle Management platform to succeed, effective deployment is essential. Our hosts are joined by Sectigo SVP of Global Sales Jennifer Binet who describes the optimal onboarding process, step by step.  Jennifer discusses adding use cases over time, streamlining the contracting process, and getting to full automation for all certificates.</itunes:summary>
      <itunes:subtitle>For any Certificate Lifecycle Management platform to succeed, effective deployment is essential. Our hosts are joined by Sectigo SVP of Global Sales Jennifer Binet who describes the optimal onboarding process, step by step.  Jennifer discusses adding use cases over time, streamlining the contracting process, and getting to full automation for all certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1221810958</guid>
      <title>Root Causes 208: Automotive Information Systems Bricked by HD Radio Error</title>
      <description><![CDATA[<p>A major automobile manufacturer recently had a problem where its infotainment systems were permanently &quot;bricked&quot; by a flaw in local HD radio broadcasts. Our hosts describe what happened and explore the lessons we can learn from this incident.</p>
]]></description>
      <pubDate>Thu, 24 Feb 2022 17:59:42 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A major automobile manufacturer recently had a problem where its infotainment systems were permanently &quot;bricked&quot; by a flaw in local HD radio broadcasts. Our hosts describe what happened and explore the lessons we can learn from this incident.</p>
]]></content:encoded>
      <enclosure length="9333285" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/26a2f4d2-2371-4139-8c0e-dd4ff3a2e193/audio/a95f073c-8b32-41e8-a886-a5a1d3e27c8b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 208: Automotive Information Systems Bricked by HD Radio Error</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/26a2f4d2-2371-4139-8c0e-dd4ff3a2e193/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:42</itunes:duration>
      <itunes:summary>A major automobile manufacturer recently had a problem where its infotainment systems were permanently &quot;bricked&quot; by a flaw in local HD radio broadcasts. Our hosts describe what happened and explore the lessons we can learn from this incident.</itunes:summary>
      <itunes:subtitle>A major automobile manufacturer recently had a problem where its infotainment systems were permanently &quot;bricked&quot; by a flaw in local HD radio broadcasts. Our hosts describe what happened and explore the lessons we can learn from this incident.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1220037058</guid>
      <title>Root Causes 207: Former Gartner Analyst David Mahdi Jumps on the Playing Field</title>
      <description><![CDATA[<p>Gartner analyst David Mahdi recently left the analyst space for Sectigo. In this episode he joins our hosts to explain the reasons for his optimism about digital trust, including NFTs, Web3, blockchain, PKI, and Zero Trust.</p>
]]></description>
      <pubDate>Mon, 21 Feb 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Gartner analyst David Mahdi recently left the analyst space for Sectigo. In this episode he joins our hosts to explain the reasons for his optimism about digital trust, including NFTs, Web3, blockchain, PKI, and Zero Trust.</p>
]]></content:encoded>
      <enclosure length="18192257" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b8745276-bae3-4953-9758-df5fed5886d0/audio/48688e73-5dc8-49d9-a28d-2f1eddfe475a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 207: Former Gartner Analyst David Mahdi Jumps on the Playing Field</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b8745276-bae3-4953-9758-df5fed5886d0/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:56</itunes:duration>
      <itunes:summary>Gartner analyst David Mahdi recently left the analyst space for Sectigo. In this episode he joins our hosts to explain the reasons for his optimism about digital trust, including NFTs, Web3, blockchain, PKI, and Zero Trust.</itunes:summary>
      <itunes:subtitle>Gartner analyst David Mahdi recently left the analyst space for Sectigo. In this episode he joins our hosts to explain the reasons for his optimism about digital trust, including NFTs, Web3, blockchain, PKI, and Zero Trust.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1215762505</guid>
      <title>Root Causes 206: What Is Web3?</title>
      <description><![CDATA[<p>Web3 refers to the concept that online content can be attributed to specific known publishers, regardless of web site or online channel. In this episode we discuss the fundamentals of Web3, including self-signing protocols, authorization of content, blockchain, definitive authorship, consensus algorithms, and meat from space.</p>
]]></description>
      <pubDate>Sun, 13 Feb 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Web3 refers to the concept that online content can be attributed to specific known publishers, regardless of web site or online channel. In this episode we discuss the fundamentals of Web3, including self-signing protocols, authorization of content, blockchain, definitive authorship, consensus algorithms, and meat from space.</p>
]]></content:encoded>
      <enclosure length="32177530" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cf5b0481-f524-43e0-a791-6faff8be4ea7/audio/86c09727-9961-4bb9-9ef7-60abd8dfb946/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 206: What Is Web3?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cf5b0481-f524-43e0-a791-6faff8be4ea7/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:30</itunes:duration>
      <itunes:summary>Web3 refers to the concept that online content can be attributed to specific known publishers, regardless of web site or online channel. In this episode we discuss the fundamentals of Web3, including self-signing protocols, authorization of content, blockchain, definitive authorship, consensus algorithms, and meat from space.</itunes:summary>
      <itunes:subtitle>Web3 refers to the concept that online content can be attributed to specific known publishers, regardless of web site or online channel. In this episode we discuss the fundamentals of Web3, including self-signing protocols, authorization of content, blockchain, definitive authorship, consensus algorithms, and meat from space.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1212867211</guid>
      <title>Root Causes 205: Anatomy of an Encrypted Peer-to-Peer Mesh Network</title>
      <description><![CDATA[<p>Secure online collaboration poses logistical and technical challenges under the best of circumstances.  Now imagine you have no designated IT staff, no designated hardware, a small budget, and remote participants who are not deeply technical. In this episode Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.</p>
]]></description>
      <pubDate>Wed, 9 Feb 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Secure online collaboration poses logistical and technical challenges under the best of circumstances.  Now imagine you have no designated IT staff, no designated hardware, a small budget, and remote participants who are not deeply technical. In this episode Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.</p>
]]></content:encoded>
      <enclosure length="11999679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/aa485b9d-e0f0-4653-b0cd-26f44681bf4b/audio/bdaeb34d-07ed-4a15-9633-958104bd90ed/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 205: Anatomy of an Encrypted Peer-to-Peer Mesh Network</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/aa485b9d-e0f0-4653-b0cd-26f44681bf4b/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:29</itunes:duration>
      <itunes:summary>Secure online collaboration poses logistical and technical challenges under the best of circumstances.  Now imagine you have no designated IT staff, no designated hardware, a small budget, and remote participants who are not deeply technical. In this episode Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.</itunes:summary>
      <itunes:subtitle>Secure online collaboration poses logistical and technical challenges under the best of circumstances.  Now imagine you have no designated IT staff, no designated hardware, a small budget, and remote participants who are not deeply technical. In this episode Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1209217972</guid>
      <title>Root Causes 204: PKI&apos;s Role in Passwordless</title>
      <description><![CDATA[<p>In previous episodes we have defined passwordless identity authentication. In this episode our hosts explain PKI's specific role in passwordless authentication, along the way clarifying the difference between password-masking and true passwordless technologies.</p>
]]></description>
      <pubDate>Wed, 2 Feb 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In previous episodes we have defined passwordless identity authentication. In this episode our hosts explain PKI's specific role in passwordless authentication, along the way clarifying the difference between password-masking and true passwordless technologies.</p>
]]></content:encoded>
      <enclosure length="22012327" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5359d365-4257-4be2-845e-e2e3b14abf68/audio/7daeb1dc-b313-4ee8-bf2b-b53235db7a7f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 204: PKI&apos;s Role in Passwordless</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5359d365-4257-4be2-845e-e2e3b14abf68/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:55</itunes:duration>
      <itunes:summary>In previous episodes we have defined passwordless identity authentication. In this episode our hosts explain PKI&apos;s specific role in passwordless authentication, along the way clarifying the difference between password-masking and true passwordless technologies.</itunes:summary>
      <itunes:subtitle>In previous episodes we have defined passwordless identity authentication. In this episode our hosts explain PKI&apos;s specific role in passwordless authentication, along the way clarifying the difference between password-masking and true passwordless technologies.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1207239178</guid>
      <title>Root Causes 203: What Is a Credential Vault?</title>
      <description><![CDATA[<p>Credential vaults are necessary for secure and functional secrets management for automated systems like DevOps or Robotic Process Automation (RPA). This episode explains how credential vaults work and details their benefits.</p>
]]></description>
      <pubDate>Mon, 31 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Credential vaults are necessary for secure and functional secrets management for automated systems like DevOps or Robotic Process Automation (RPA). This episode explains how credential vaults work and details their benefits.</p>
]]></content:encoded>
      <enclosure length="10321808" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3c0d3478-ec53-40b8-b231-5dce04ae69e5/audio/1f4f699f-6d8f-4c96-a679-2b565cefce83/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 203: What Is a Credential Vault?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3c0d3478-ec53-40b8-b231-5dce04ae69e5/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:44</itunes:duration>
      <itunes:summary>Credential vaults are necessary for secure and functional secrets management for automated systems like DevOps or Robotic Process Automation (RPA). This episode explains how credential vaults work and details their benefits.</itunes:summary>
      <itunes:subtitle>Credential vaults are necessary for secure and functional secrets management for automated systems like DevOps or Robotic Process Automation (RPA). This episode explains how credential vaults work and details their benefits.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1204793467</guid>
      <title>Root Causes 202 : What Is Certificate Transparency?</title>
      <description><![CDATA[<p>Certificate Transparency (CT) is essential to monitoring the public SSL certificates that are issued. In this episode we explain what CT logs are, how they work, and the uses we can put them to.</p>
]]></description>
      <pubDate>Thu, 27 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certificate Transparency (CT) is essential to monitoring the public SSL certificates that are issued. In this episode we explain what CT logs are, how they work, and the uses we can put them to.</p>
]]></content:encoded>
      <enclosure length="14940088" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/afdd80cb-24e6-4af4-8e2b-cc141ee515f8/audio/8fab134b-cb35-4182-9d00-fdce6b4111b1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 202 : What Is Certificate Transparency?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/afdd80cb-24e6-4af4-8e2b-cc141ee515f8/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:33</itunes:duration>
      <itunes:summary>Certificate Transparency (CT) is essential to monitoring the public SSL certificates that are issued. In this episode we explain what CT logs are, how they work, and the uses we can put them to.</itunes:summary>
      <itunes:subtitle>Certificate Transparency (CT) is essential to monitoring the public SSL certificates that are issued. In this episode we explain what CT logs are, how they work, and the uses we can put them to.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1202854744</guid>
      <title>Root Causes 201: What Are the Baseline Requirements?</title>
      <description><![CDATA[<p>The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. In this episode we explain what the Baseline Requirements are, how they are created, and why they matter.</p>
]]></description>
      <pubDate>Mon, 24 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. In this episode we explain what the Baseline Requirements are, how they are created, and why they matter.</p>
]]></content:encoded>
      <enclosure length="15596162" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/58291575-c7e9-41f4-9d9a-92eba03bc310/audio/ace4a084-09ef-419c-965e-ef88aac81f65/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 201: What Are the Baseline Requirements?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/58291575-c7e9-41f4-9d9a-92eba03bc310/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:14</itunes:duration>
      <itunes:summary>The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. In this episode we explain what the Baseline Requirements are, how they are created, and why they matter.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. In this episode we explain what the Baseline Requirements are, how they are created, and why they matter.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1199550412</guid>
      <title>Root Causes 200: Why Not to Copy and Paste Commands from Web Pages</title>
      <description><![CDATA[<p>This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack. Our hosts explain how this attack can occur and its potential consequences, along with how to defend yourself against this threat.</p>
]]></description>
      <pubDate>Wed, 19 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack. Our hosts explain how this attack can occur and its potential consequences, along with how to defend yourself against this threat.</p>
]]></content:encoded>
      <enclosure length="6851158" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/da3e5112-5878-4ffc-ab7f-53c69ce7ebbd/audio/7ea1bd8b-0ef3-4f99-8c13-4c74b9dca4ff/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 200: Why Not to Copy and Paste Commands from Web Pages</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/da3e5112-5878-4ffc-ab7f-53c69ce7ebbd/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:07</itunes:duration>
      <itunes:summary>This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack. Our hosts explain how this attack can occur and its potential consequences, along with how to defend yourself against this threat.</itunes:summary>
      <itunes:subtitle>This episode describes newly revealed vulnerabilities where copying and pasting text from a web page can open the site visitor up to attack. Our hosts explain how this attack can occur and its potential consequences, along with how to defend yourself against this threat.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1196632735</guid>
      <title>Root Causes 199: What Is Privileged Access Management?</title>
      <description><![CDATA[<p>In this episode we explain Privileged Access Management (PAM). We go on to explain some of the ways that networks using these techniques are still vulnerable to attack and what to do about it.</p>
]]></description>
      <pubDate>Thu, 13 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explain Privileged Access Management (PAM). We go on to explain some of the ways that networks using these techniques are still vulnerable to attack and what to do about it.</p>
]]></content:encoded>
      <enclosure length="15381291" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7442af6f-44e2-47a9-a590-34c1d89769b1/audio/86337c92-82e4-4036-bb27-4e32901553cb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 199: What Is Privileged Access Management?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7442af6f-44e2-47a9-a590-34c1d89769b1/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:00</itunes:duration>
      <itunes:summary>In this episode we explain Privileged Access Management (PAM). We go on to explain some of the ways that networks using these techniques are still vulnerable to attack and what to do about it.</itunes:summary>
      <itunes:subtitle>In this episode we explain Privileged Access Management (PAM). We go on to explain some of the ways that networks using these techniques are still vulnerable to attack and what to do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1194552067</guid>
      <title>Root Causes 198: Deep Voice Fakes</title>
      <description><![CDATA[<p>We are all familiar with phishing in its various forms. Many people feel that they can protect themselves from fraud by verbally confirming apparent commands from senior executes. In this episode our hosts explore deep voice fakes, computer generated audio that successfully passes for the voice of a known associate, and the risks they pose.</p>
]]></description>
      <pubDate>Tue, 11 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>We are all familiar with phishing in its various forms. Many people feel that they can protect themselves from fraud by verbally confirming apparent commands from senior executes. In this episode our hosts explore deep voice fakes, computer generated audio that successfully passes for the voice of a known associate, and the risks they pose.</p>
]]></content:encoded>
      <enclosure length="14288047" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/10784789-6070-4566-aebf-cc506a630408/audio/a136095b-f173-43e4-a650-d4d7b224702d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 198: Deep Voice Fakes</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/10784789-6070-4566-aebf-cc506a630408/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:52</itunes:duration>
      <itunes:summary>We are all familiar with phishing in its various forms. Many people feel that they can protect themselves from fraud by verbally confirming apparent commands from senior executes. In this episode our hosts explore deep voice fakes, computer generated audio that successfully passes for the voice of a known associate, and the risks they pose.</itunes:summary>
      <itunes:subtitle>We are all familiar with phishing in its various forms. Many people feel that they can protect themselves from fraud by verbally confirming apparent commands from senior executes. In this episode our hosts explore deep voice fakes, computer generated audio that successfully passes for the voice of a known associate, and the risks they pose.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1192362853</guid>
      <title>Root Causes 197: Tim&apos;s Digital Haircut</title>
      <description><![CDATA[<p>In this episode our hosts describe the extreme degree to which all business has become digital business, even the most offline businesses you can think of, including food delivery, in-restaurant dining, bricks-and-mortar retail, and naturally, haircuts. We discuss the disparate, interconnected systems required to make this happen and the fragility of this new digital world.</p>
]]></description>
      <pubDate>Fri, 7 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode our hosts describe the extreme degree to which all business has become digital business, even the most offline businesses you can think of, including food delivery, in-restaurant dining, bricks-and-mortar retail, and naturally, haircuts. We discuss the disparate, interconnected systems required to make this happen and the fragility of this new digital world.</p>
]]></content:encoded>
      <enclosure length="11508842" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/38d2a72c-ae33-45f0-927c-ef3308c28f7f/audio/fb44c4bf-ad55-40c7-9687-db91595f6a3d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 197: Tim&apos;s Digital Haircut</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/38d2a72c-ae33-45f0-927c-ef3308c28f7f/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:58</itunes:duration>
      <itunes:summary>In this episode our hosts describe the extreme degree to which all business has become digital business, even the most offline businesses you can think of, including food delivery, in-restaurant dining, bricks-and-mortar retail, and naturally, haircuts. We discuss the disparate, interconnected systems required to make this happen and the fragility of this new digital world.</itunes:summary>
      <itunes:subtitle>In this episode our hosts describe the extreme degree to which all business has become digital business, even the most offline businesses you can think of, including food delivery, in-restaurant dining, bricks-and-mortar retail, and naturally, haircuts. We discuss the disparate, interconnected systems required to make this happen and the fragility of this new digital world.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1190249227</guid>
      <title>Root Causes 196: What Is Certificate Agnostic?</title>
      <description><![CDATA[<p>In 2021 the certificate industry saw the emergency of the concept of &quot;CA agnostic.&quot; However, that is only part of the story.</p>
<p>In this episode our hosts build on this concept to define the idea of certificate automation platforms being &quot;certificate agnostic,&quot; meaning these platforms should handle all certificates regardless of type, configuration, physical location, environment, use case, and origin.</p>
]]></description>
      <pubDate>Mon, 3 Jan 2022 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In 2021 the certificate industry saw the emergency of the concept of &quot;CA agnostic.&quot; However, that is only part of the story.</p>
<p>In this episode our hosts build on this concept to define the idea of certificate automation platforms being &quot;certificate agnostic,&quot; meaning these platforms should handle all certificates regardless of type, configuration, physical location, environment, use case, and origin.</p>
]]></content:encoded>
      <enclosure length="10054343" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b51f1783-0a65-4f50-8371-9af04244fd11/audio/4961d2de-2dec-4905-9ac2-220d9d8ca190/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 196: What Is Certificate Agnostic?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b51f1783-0a65-4f50-8371-9af04244fd11/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:27</itunes:duration>
      <itunes:summary>In 2021 the certificate industry saw the emergency of the concept of &quot;CA agnostic.&quot; However, that is only part of the story. 

In this episode our hosts build on this concept to define the idea of certificate automation platforms being &quot;certificate agnostic,&quot; meaning these platforms should handle all certificates regardless of type, configuration, physical location, environment, use case, and origin.</itunes:summary>
      <itunes:subtitle>In 2021 the certificate industry saw the emergency of the concept of &quot;CA agnostic.&quot; However, that is only part of the story. 

In this episode our hosts build on this concept to define the idea of certificate automation platforms being &quot;certificate agnostic,&quot; meaning these platforms should handle all certificates regardless of type, configuration, physical location, environment, use case, and origin.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1185847021</guid>
      <title>Root Causes 195: iOS App Privacy Audits</title>
      <description><![CDATA[<p>The latest update of iOS includes new capabilities for app privacy auditing and permissions. Our hosts explain the controls available on iOS and Android and how a mobile device privacy audit can be beneficial.</p>
]]></description>
      <pubDate>Mon, 27 Dec 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The latest update of iOS includes new capabilities for app privacy auditing and permissions. Our hosts explain the controls available on iOS and Android and how a mobile device privacy audit can be beneficial.</p>
]]></content:encoded>
      <enclosure length="5738429" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6c6e0daa-9b17-42dd-bec1-05ef824bc38f/audio/98d3d83d-81f2-4cfc-a487-3a784694b319/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 195: iOS App Privacy Audits</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6c6e0daa-9b17-42dd-bec1-05ef824bc38f/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:58</itunes:duration>
      <itunes:summary>The latest update of iOS includes new capabilities for app privacy auditing and permissions. Our hosts explain the controls available on iOS and Android and how a mobile device privacy audit can be beneficial.</itunes:summary>
      <itunes:subtitle>The latest update of iOS includes new capabilities for app privacy auditing and permissions. Our hosts explain the controls available on iOS and Android and how a mobile device privacy audit can be beneficial.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1181372983</guid>
      <title>Root Causes 194: Crypto Versus Cryptocurrency</title>
      <description><![CDATA[<p>Exploding interest in cryptocurrency has caused the word crypto to take on new meanings that were not part of the public dialog even a few years ago. In this episode our hosts explore both the overlap and difference between today's cryptocurrency (and blockchain) and more venerable forms of cryptography.</p>
]]></description>
      <pubDate>Mon, 20 Dec 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Exploding interest in cryptocurrency has caused the word crypto to take on new meanings that were not part of the public dialog even a few years ago. In this episode our hosts explore both the overlap and difference between today's cryptocurrency (and blockchain) and more venerable forms of cryptography.</p>
]]></content:encoded>
      <enclosure length="13294704" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/21f8f77b-0791-40ff-ae89-454a5761c34f/audio/68f15399-2d2d-48f4-ab40-55133f527b9f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 194: Crypto Versus Cryptocurrency</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/21f8f77b-0791-40ff-ae89-454a5761c34f/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:50</itunes:duration>
      <itunes:summary>Exploding interest in cryptocurrency has caused the word crypto to take on new meanings that were not part of the public dialog even a few years ago. In this episode our hosts explore both the overlap and difference between today&apos;s cryptocurrency (and blockchain) and more venerable forms of cryptography.</itunes:summary>
      <itunes:subtitle>Exploding interest in cryptocurrency has caused the word crypto to take on new meanings that were not part of the public dialog even a few years ago. In this episode our hosts explore both the overlap and difference between today&apos;s cryptocurrency (and blockchain) and more venerable forms of cryptography.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1179263212</guid>
      <title>Root Causes 193: 4 Positive Security Trends for 2022</title>
      <description><![CDATA[<p>Our hosts look back at four positive security trends in 2021 that industry should continue in 2022.</p>
]]></description>
      <pubDate>Thu, 16 Dec 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our hosts look back at four positive security trends in 2021 that industry should continue in 2022.</p>
]]></content:encoded>
      <enclosure length="15271736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d1c2b7d4-401c-4f27-a31f-4a893d33850e/audio/68a44d46-427a-4a15-a83c-23a6a5e0d080/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 193: 4 Positive Security Trends for 2022</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d1c2b7d4-401c-4f27-a31f-4a893d33850e/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:53</itunes:duration>
      <itunes:summary>Our hosts look back at four positive security trends in 2021 that industry should continue in 2022.</itunes:summary>
      <itunes:subtitle>Our hosts look back at four positive security trends in 2021 that industry should continue in 2022.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1177134874</guid>
      <title>Root Causes 192: 14 Security Fallacies We Still Have in 2021</title>
      <description><![CDATA[<p>In this year-end lookback episode, our hosts describe 14 common fallacies that still haunt IT professionals in 2021 - and the negative effects those fallacies bring.</p>
]]></description>
      <pubDate>Mon, 13 Dec 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this year-end lookback episode, our hosts describe 14 common fallacies that still haunt IT professionals in 2021 - and the negative effects those fallacies bring.</p>
]]></content:encoded>
      <enclosure length="23524667" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/7c9b3ad0-12f9-4fc2-b9c0-44d0eb22066c/audio/20a588f5-53e7-40be-8007-51bd2d73bbe7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 192: 14 Security Fallacies We Still Have in 2021</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/7c9b3ad0-12f9-4fc2-b9c0-44d0eb22066c/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:29</itunes:duration>
      <itunes:summary>In this year-end lookback episode, our hosts describe 14 common fallacies that still haunt IT professionals in 2021 - and the negative effects those fallacies bring.</itunes:summary>
      <itunes:subtitle>In this year-end lookback episode, our hosts describe 14 common fallacies that still haunt IT professionals in 2021 - and the negative effects those fallacies bring.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1174241335</guid>
      <title>Root Causes 191: What Is Robotic Process Automation (RPA)?</title>
      <description><![CDATA[<p>An important trend sweeping enterprise IT is Robotic Process Automation. Our hosts define RPA and explain the importance of cryptographically secured digital identity in safely implementing RPA.</p>
]]></description>
      <pubDate>Wed, 8 Dec 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>An important trend sweeping enterprise IT is Robotic Process Automation. Our hosts define RPA and explain the importance of cryptographically secured digital identity in safely implementing RPA.</p>
]]></content:encoded>
      <enclosure length="14271451" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5bd7264b-1430-4142-b9fc-bc4bf0ff033d/audio/da8843cb-11b5-4a26-9532-736c36f7cbb1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 191: What Is Robotic Process Automation (RPA)?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5bd7264b-1430-4142-b9fc-bc4bf0ff033d/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:51</itunes:duration>
      <itunes:summary>An important trend sweeping enterprise IT is Robotic Process Automation. Our hosts define RPA and explain the importance of cryptographically secured digital identity in safely implementing RPA.</itunes:summary>
      <itunes:subtitle>An important trend sweeping enterprise IT is Robotic Process Automation. Our hosts define RPA and explain the importance of cryptographically secured digital identity in safely implementing RPA.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1168870915</guid>
      <title>Root Causes 190: Phishing Coinbase</title>
      <description><![CDATA[<p>In continuation of our ongoing exploration of blockchain and cryptocurrency, our hosts describe a recently discovered exploit where attackers use weaknesses in one-time-password-based MFA to steal Coinbase accounts.</p>
]]></description>
      <pubDate>Mon, 29 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In continuation of our ongoing exploration of blockchain and cryptocurrency, our hosts describe a recently discovered exploit where attackers use weaknesses in one-time-password-based MFA to steal Coinbase accounts.</p>
]]></content:encoded>
      <enclosure length="8625095" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/092836a5-5910-4894-b9bf-63c99e6ec736/audio/1de75898-1437-4db3-81b7-5048f2d0ae1f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 190: Phishing Coinbase</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/092836a5-5910-4894-b9bf-63c99e6ec736/3000x3000/artworks-xr65pzbcwpfy47ra-nss84g-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:58</itunes:duration>
      <itunes:summary>In continuation of our ongoing exploration of blockchain and cryptocurrency, our hosts describe a recently discovered exploit where attackers use weaknesses in one-time-password-based MFA to steal Coinbase accounts.</itunes:summary>
      <itunes:subtitle>In continuation of our ongoing exploration of blockchain and cryptocurrency, our hosts describe a recently discovered exploit where attackers use weaknesses in one-time-password-based MFA to steal Coinbase accounts.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1161647932</guid>
      <title>Root Causes 189: What Is CA Agnostic?</title>
      <description><![CDATA[<p>Certificate Lifecycle Management (CLM) platforms can deal with certificates from a number of sources. A CLM that can provision certificates of all types from all CAs, private and public, would be described as &quot;CA agnostic.&quot; In this episode we explain this idea and its significance along with the key criteria for choosing a CA agnostic CLM platform.</p>
]]></description>
      <pubDate>Wed, 17 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certificate Lifecycle Management (CLM) platforms can deal with certificates from a number of sources. A CLM that can provision certificates of all types from all CAs, private and public, would be described as &quot;CA agnostic.&quot; In this episode we explain this idea and its significance along with the key criteria for choosing a CA agnostic CLM platform.</p>
]]></content:encoded>
      <enclosure length="16234547" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d9694044-bf16-4c88-8a0b-6f9839648f6a/audio/d4c50c9f-8a98-47cd-ada1-2c2ac1891fae/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 189: What Is CA Agnostic?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d9694044-bf16-4c88-8a0b-6f9839648f6a/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:54</itunes:duration>
      <itunes:summary>Certificate Lifecycle Management (CLM) platforms can deal with certificates from a number of sources. A CLM that can provision certificates of all types from all CAs, private and public, would be described as &quot;CA agnostic.&quot; In this episode we explain this idea and its significance along with the key criteria for choosing a CA agnostic CLM platform.</itunes:summary>
      <itunes:subtitle>Certificate Lifecycle Management (CLM) platforms can deal with certificates from a number of sources. A CLM that can provision certificates of all types from all CAs, private and public, would be described as &quot;CA agnostic.&quot; In this episode we explain this idea and its significance along with the key criteria for choosing a CA agnostic CLM platform.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1158833449</guid>
      <title>Root Causes 188: Introduction to Web Security</title>
      <description><![CDATA[<p>Malware and other web site attacks are a frequent problem for small businesses and can result in reputational damage and site access being blocked or hindered by end user software and services. We are joined by web site protection expert JP Armenta, who explains how these attacks occur, their effects, and how site operators can protect themselves.</p>
]]></description>
      <pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Malware and other web site attacks are a frequent problem for small businesses and can result in reputational damage and site access being blocked or hindered by end user software and services. We are joined by web site protection expert JP Armenta, who explains how these attacks occur, their effects, and how site operators can protect themselves.</p>
]]></content:encoded>
      <enclosure length="19520539" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/49c28dec-f11d-4a46-8dde-1fe08911215d/audio/ae39a23c-ecf0-42b2-b0f8-c22bd9863531/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 188: Introduction to Web Security</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/49c28dec-f11d-4a46-8dde-1fe08911215d/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:19</itunes:duration>
      <itunes:summary>Malware and other web site attacks are a frequent problem for small businesses and can result in reputational damage and site access being blocked or hindered by end user software and services. We are joined by web site protection expert JP Armenta, who explains how these attacks occur, their effects, and how site operators can protect themselves.</itunes:summary>
      <itunes:subtitle>Malware and other web site attacks are a frequent problem for small businesses and can result in reputational damage and site access being blocked or hindered by end user software and services. We are joined by web site protection expert JP Armenta, who explains how these attacks occur, their effects, and how site operators can protect themselves.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1156387924</guid>
      <title>Root Causes 187: Apple Limits Term for S/MIME Certificates</title>
      <description><![CDATA[<p>Apple recently announced that it would be limiting the allowable term for public S/MIME certificates to 825 days. Our hosts explain the implications of this declaration.</p>
]]></description>
      <pubDate>Sun, 7 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Apple recently announced that it would be limiting the allowable term for public S/MIME certificates to 825 days. Our hosts explain the implications of this declaration.</p>
]]></content:encoded>
      <enclosure length="16230600" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9628ad96-3947-4b34-9726-736beaceb74d/audio/2fc586b4-44dd-4ef8-ba92-9cdf91c73754/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 187: Apple Limits Term for S/MIME Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9628ad96-3947-4b34-9726-736beaceb74d/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:53</itunes:duration>
      <itunes:summary>Apple recently announced that it would be limiting the allowable term for public S/MIME certificates to 825 days. Our hosts explain the implications of this declaration.</itunes:summary>
      <itunes:subtitle>Apple recently announced that it would be limiting the allowable term for public S/MIME certificates to 825 days. Our hosts explain the implications of this declaration.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1154064493</guid>
      <title>Root Causes 186: Digital Signature SNAFU Costs Swiss Company 3 Billion Euro Contract</title>
      <description><![CDATA[<p>In this episode our hosts explain how an esoteric digital signature error rendered a 3 billion Euro manufacturing contract with the Austrian government invalid.</p>
]]></description>
      <pubDate>Thu, 4 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode our hosts explain how an esoteric digital signature error rendered a 3 billion Euro manufacturing contract with the Austrian government invalid.</p>
]]></content:encoded>
      <enclosure length="19259027" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/437b65fb-12bb-42ec-951e-6ea51f4b826f/audio/12934488-305f-4e5e-aacf-8534a0378230/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 186: Digital Signature SNAFU Costs Swiss Company 3 Billion Euro Contract</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/437b65fb-12bb-42ec-951e-6ea51f4b826f/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:03</itunes:duration>
      <itunes:summary>In this episode our hosts explain how an esoteric digital signature error rendered a 3 billion Euro manufacturing contract with the Austrian government invalid.</itunes:summary>
      <itunes:subtitle>In this episode our hosts explain how an esoteric digital signature error rendered a 3 billion Euro manufacturing contract with the Austrian government invalid.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1152632827</guid>
      <title>Root Causes 185: EU Covid Passport Root Key Stolen</title>
      <description><![CDATA[<p>The root certificates of the EU's Covid Passport program have suffered a private key compromise and counterfeit passports are now for sale on the black market. We explain the implications of this shocking revelation.</p>
]]></description>
      <pubDate>Mon, 1 Nov 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The root certificates of the EU's Covid Passport program have suffered a private key compromise and counterfeit passports are now for sale on the black market. We explain the implications of this shocking revelation.</p>
]]></content:encoded>
      <enclosure length="16322095" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5dc63345-beb1-46f8-aedc-adbda4b6cfc8/audio/f565df32-69c3-433d-858e-2bd995f69355/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 185: EU Covid Passport Root Key Stolen</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5dc63345-beb1-46f8-aedc-adbda4b6cfc8/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:59</itunes:duration>
      <itunes:summary>The root certificates of the EU&apos;s Covid Passport program have suffered a private key compromise and counterfeit passports are now for sale on the black market. We explain the implications of this shocking revelation.</itunes:summary>
      <itunes:subtitle>The root certificates of the EU&apos;s Covid Passport program have suffered a private key compromise and counterfeit passports are now for sale on the black market. We explain the implications of this shocking revelation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1149073429</guid>
      <title>Root Causes 184: Popular College WiFi Vulnerability Revealed</title>
      <description><![CDATA[<p>Recent research reveals that certificate misconfiguration in a commonly used college WiFi platform that can lead to exposure and theft of users' login credentials. Our hosts discuss WiFi authentication and the EAP protocol and explain how this vulnerability occurs.</p>
]]></description>
      <pubDate>Tue, 26 Oct 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent research reveals that certificate misconfiguration in a commonly used college WiFi platform that can lead to exposure and theft of users' login credentials. Our hosts discuss WiFi authentication and the EAP protocol and explain how this vulnerability occurs.</p>
]]></content:encoded>
      <enclosure length="11534481" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c408d8e5-14ee-4c12-8293-eeb7cd769180/audio/df92e0ee-4014-48c9-b916-6afee9fbbd8f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 184: Popular College WiFi Vulnerability Revealed</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c408d8e5-14ee-4c12-8293-eeb7cd769180/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:00</itunes:duration>
      <itunes:summary>Recent research reveals that certificate misconfiguration in a commonly used college WiFi platform that can lead to exposure and theft of users&apos; login credentials. Our hosts discuss WiFi authentication and the EAP protocol and explain how this vulnerability occurs.</itunes:summary>
      <itunes:subtitle>Recent research reveals that certificate misconfiguration in a commonly used college WiFi platform that can lead to exposure and theft of users&apos; login credentials. Our hosts discuss WiFi authentication and the EAP protocol and explain how this vulnerability occurs.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1145567782</guid>
      <title>Root Causes 183: New MSCA Attack Toolkits</title>
      <description><![CDATA[<p>At this year's BlackHat, a talk and white paper detailed the threat of MSCA root key attacks, which can be used to create unauthorized certificates.  This release includes a pair of offensive toolkits and a defensive toolkit.  We explain the importance of this release and provide a clear action list for IT professionals in charge of Microsoft CA.</p>
]]></description>
      <pubDate>Thu, 21 Oct 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>At this year's BlackHat, a talk and white paper detailed the threat of MSCA root key attacks, which can be used to create unauthorized certificates.  This release includes a pair of offensive toolkits and a defensive toolkit.  We explain the importance of this release and provide a clear action list for IT professionals in charge of Microsoft CA.</p>
]]></content:encoded>
      <enclosure length="13738429" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/662a6743-1a6a-4fff-b0cc-f2b1417028f3/audio/bebef8fa-29b5-4d86-b456-7b37edf76b41/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 183: New MSCA Attack Toolkits</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/662a6743-1a6a-4fff-b0cc-f2b1417028f3/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:18</itunes:duration>
      <itunes:summary>At this year&apos;s BlackHat, a talk and white paper detailed the threat of MSCA root key attacks, which can be used to create unauthorized certificates.  This release includes a pair of offensive toolkits and a defensive toolkit.  We explain the importance of this release and provide a clear action list for IT professionals in charge of Microsoft CA.</itunes:summary>
      <itunes:subtitle>At this year&apos;s BlackHat, a talk and white paper detailed the threat of MSCA root key attacks, which can be used to create unauthorized certificates.  This release includes a pair of offensive toolkits and a defensive toolkit.  We explain the importance of this release and provide a clear action list for IT professionals in charge of Microsoft CA.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1143877063</guid>
      <title>Root Causes 182: Let&apos;s Encrypt Root Expiration</title>
      <description><![CDATA[<p>Let's Encrypt's recent root expiration caused widespread service outages and other hassles for online services and sites. Our hosts discuss this expiration, why so many problems resulted, and the recipe for avoiding these problems in the future.</p>
]]></description>
      <pubDate>Mon, 18 Oct 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Let's Encrypt's recent root expiration caused widespread service outages and other hassles for online services and sites. Our hosts discuss this expiration, why so many problems resulted, and the recipe for avoiding these problems in the future.</p>
]]></content:encoded>
      <enclosure length="24466729" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/64742709-6d43-4889-8b1e-d6971e240dc9/audio/5db5713a-977d-4f5f-92e4-a46fa9bff786/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 182: Let&apos;s Encrypt Root Expiration</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/64742709-6d43-4889-8b1e-d6971e240dc9/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:28</itunes:duration>
      <itunes:summary>Let&apos;s Encrypt&apos;s recent root expiration caused widespread service outages and other hassles for online services and sites. Our hosts discuss this expiration, why so many problems resulted, and the recipe for avoiding these problems in the future.</itunes:summary>
      <itunes:subtitle>Let&apos;s Encrypt&apos;s recent root expiration caused widespread service outages and other hassles for online services and sites. Our hosts discuss this expiration, why so many problems resulted, and the recipe for avoiding these problems in the future.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1115780668</guid>
      <title>Root Causes 181: Limitation of DCV Through Web Site Changes</title>
      <description><![CDATA[<p>This December will see a meaningful change in how CAs are allowed to conduct Domain Control Validation (DCV) using the method known as https token or file authentication or agreed up on change to web site. This method will be removed as an option for &quot;domain spaces&quot; including wildcards and subdomains. Join our hosts as they explain how DCV works and how the rules are changing and why. And we clarify the available options for those changing their preferred DCV methods.</p>
]]></description>
      <pubDate>Sun, 29 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>This December will see a meaningful change in how CAs are allowed to conduct Domain Control Validation (DCV) using the method known as https token or file authentication or agreed up on change to web site. This method will be removed as an option for &quot;domain spaces&quot; including wildcards and subdomains. Join our hosts as they explain how DCV works and how the rules are changing and why. And we clarify the available options for those changing their preferred DCV methods.</p>
]]></content:encoded>
      <enclosure length="12587007" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e9eb1cc2-9b39-45cf-bb76-c681d5e29084/audio/ef7a6906-0b47-49d3-bd4e-9a2118411878/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 181: Limitation of DCV Through Web Site Changes</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e9eb1cc2-9b39-45cf-bb76-c681d5e29084/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:06</itunes:duration>
      <itunes:summary>This December will see a meaningful change in how CAs are allowed to conduct Domain Control Validation (DCV) using the method known as https token or file authentication or agreed up on change to web site. This method will be removed as an option for &quot;domain spaces&quot; including wildcards and subdomains. Join our hosts as they explain how DCV works and how the rules are changing and why. And we clarify the available options for those changing their preferred DCV methods.</itunes:summary>
      <itunes:subtitle>This December will see a meaningful change in how CAs are allowed to conduct Domain Control Validation (DCV) using the method known as https token or file authentication or agreed up on change to web site. This method will be removed as an option for &quot;domain spaces&quot; including wildcards and subdomains. Join our hosts as they explain how DCV works and how the rules are changing and why. And we clarify the available options for those changing their preferred DCV methods.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1113371632</guid>
      <title>Root Causes 180: PetitPotam MSCA Attack</title>
      <description><![CDATA[<p>The PetitPotam attack against Microsoft CA has garnered a lot of attention. Our hosts describe this attack and define related terms like Mimikatz, pass-the-hash, and NTLM Relay. The episode goes on to give a roadmap for mitigating this attack , including free resources available to help defend against PetitPotam.</p>
]]></description>
      <pubDate>Thu, 26 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The PetitPotam attack against Microsoft CA has garnered a lot of attention. Our hosts describe this attack and define related terms like Mimikatz, pass-the-hash, and NTLM Relay. The episode goes on to give a roadmap for mitigating this attack , including free resources available to help defend against PetitPotam.</p>
]]></content:encoded>
      <enclosure length="11665998" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4bfbe64a-aa2e-4c29-9e8e-ae6a298061f5/audio/80f2ff6e-b76b-4cff-befd-20694f5fc9dd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 180: PetitPotam MSCA Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4bfbe64a-aa2e-4c29-9e8e-ae6a298061f5/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:08</itunes:duration>
      <itunes:summary>The PetitPotam attack against Microsoft CA has garnered a lot of attention. Our hosts describe this attack and define related terms like Mimikatz, pass-the-hash, and NTLM Relay. The episode goes on to give a roadmap for mitigating this attack , including free resources available to help defend against PetitPotam.</itunes:summary>
      <itunes:subtitle>The PetitPotam attack against Microsoft CA has garnered a lot of attention. Our hosts describe this attack and define related terms like Mimikatz, pass-the-hash, and NTLM Relay. The episode goes on to give a roadmap for mitigating this attack , including free resources available to help defend against PetitPotam.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1112042269</guid>
      <title>Root Causes 179: Standards for Certificates Apart from SSL</title>
      <description><![CDATA[<p>Regular followers of this podcast hear a great deal about SSL, the CA/Browser Forum, and the standards governing public SSL. But SSL is not the only regulated type of public digital certificate. There are also things like S/MIME, eIDAS, code signing, document signing, and SSH certificates.  In this episode our hosts discuss these &quot;other&quot; certificate types and the rules and regulations governing them.</p>
]]></description>
      <pubDate>Mon, 23 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Regular followers of this podcast hear a great deal about SSL, the CA/Browser Forum, and the standards governing public SSL. But SSL is not the only regulated type of public digital certificate. There are also things like S/MIME, eIDAS, code signing, document signing, and SSH certificates.  In this episode our hosts discuss these &quot;other&quot; certificate types and the rules and regulations governing them.</p>
]]></content:encoded>
      <enclosure length="13814594" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4a6b2074-7494-4369-8125-56ba3ced0fea/audio/1408bf7f-7545-4df9-b268-1d7ccf2e8ed5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 179: Standards for Certificates Apart from SSL</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4a6b2074-7494-4369-8125-56ba3ced0fea/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:22</itunes:duration>
      <itunes:summary>Regular followers of this podcast hear a great deal about SSL, the CA/Browser Forum, and the standards governing public SSL. But SSL is not the only regulated type of public digital certificate. There are also things like S/MIME, eIDAS, code signing, document signing, and SSH certificates.  In this episode our hosts discuss these &quot;other&quot; certificate types and the rules and regulations governing them.</itunes:summary>
      <itunes:subtitle>Regular followers of this podcast hear a great deal about SSL, the CA/Browser Forum, and the standards governing public SSL. But SSL is not the only regulated type of public digital certificate. There are also things like S/MIME, eIDAS, code signing, document signing, and SSH certificates.  In this episode our hosts discuss these &quot;other&quot; certificate types and the rules and regulations governing them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1109815063</guid>
      <title>Root Causes 178: Stealing Cryptocurrency</title>
      <description><![CDATA[<p>In this episode our hosts go through the various ways in which cryptocurrency can be stolen or lost, including private key compromise, security failures at cryptocurrency brokers, and theft of login credentials. Our hosts also discuss how manipulation of the public ledger could also lead to unfair distribution of cryptocurrency value.</p>
]]></description>
      <pubDate>Fri, 20 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode our hosts go through the various ways in which cryptocurrency can be stolen or lost, including private key compromise, security failures at cryptocurrency brokers, and theft of login credentials. Our hosts also discuss how manipulation of the public ledger could also lead to unfair distribution of cryptocurrency value.</p>
]]></content:encoded>
      <enclosure length="13314893" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/be6f4eca-a353-47e9-a74f-1c4a508a8064/audio/8fda285e-0e4a-41e3-b6da-ffba81937981/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 178: Stealing Cryptocurrency</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/be6f4eca-a353-47e9-a74f-1c4a508a8064/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:51</itunes:duration>
      <itunes:summary>In this episode our hosts go through the various ways in which cryptocurrency can be stolen or lost, including private key compromise, security failures at cryptocurrency brokers, and theft of login credentials. Our hosts also discuss how manipulation of the public ledger could also lead to unfair distribution of cryptocurrency value.</itunes:summary>
      <itunes:subtitle>In this episode our hosts go through the various ways in which cryptocurrency can be stolen or lost, including private key compromise, security failures at cryptocurrency brokers, and theft of login credentials. Our hosts also discuss how manipulation of the public ledger could also lead to unfair distribution of cryptocurrency value.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1103037637</guid>
      <title>Root Causes 177: What Is Passwordless?</title>
      <description><![CDATA[<p>A hot, new topic in the identity space is passwordless. Join our hosts as they explain credential form factors and offer a specific definition of passwordless, including the difference between PINs and passwords.</p>
]]></description>
      <pubDate>Mon, 9 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A hot, new topic in the identity space is passwordless. Join our hosts as they explain credential form factors and offer a specific definition of passwordless, including the difference between PINs and passwords.</p>
]]></content:encoded>
      <enclosure length="19192107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/20ddc1df-95a5-472d-9536-68cfcd043229/audio/b6fa0f6d-7f0b-443f-8df6-dd337b508fff/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 177: What Is Passwordless?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/20ddc1df-95a5-472d-9536-68cfcd043229/3000x3000/artworks-05bwpznr5qaqvapf-dcgkeq-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:58</itunes:duration>
      <itunes:summary>A hot, new topic in the identity space is passwordless. Join our hosts as they explain credential form factors and offer a specific definition of passwordless, including the difference between PINs and passwords.</itunes:summary>
      <itunes:subtitle>A hot, new topic in the identity space is passwordless. Join our hosts as they explain credential form factors and offer a specific definition of passwordless, including the difference between PINs and passwords.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1100703607</guid>
      <title>Root Causes 176: Introducing State-Locality Exclusivity</title>
      <description><![CDATA[<p>Sectigo is implementing an important change to its public-facing SSL certificate business, which we call State-Locality Exclusivity. This change removes a the localityName field, a very common field in SSL certificates. In this episode our hosts explain what the localityName field is, why we are removing it, and how this change is to the benefit of SSL Subscribers and Relying Parties.</p>
]]></description>
      <pubDate>Thu, 5 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Sectigo is implementing an important change to its public-facing SSL certificate business, which we call State-Locality Exclusivity. This change removes a the localityName field, a very common field in SSL certificates. In this episode our hosts explain what the localityName field is, why we are removing it, and how this change is to the benefit of SSL Subscribers and Relying Parties.</p>
]]></content:encoded>
      <enclosure length="25570468" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/1df3a28a-29d3-4c3a-bd1a-4ffa4a24ff18/audio/2e64967f-4ea6-4f2e-96e8-d8941fc3fcac/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 176: Introducing State-Locality Exclusivity</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/1df3a28a-29d3-4c3a-bd1a-4ffa4a24ff18/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:37</itunes:duration>
      <itunes:summary>Sectigo is implementing an important change to its public-facing SSL certificate business, which we call State-Locality Exclusivity. This change removes a the localityName field, a very common field in SSL certificates. In this episode our hosts explain what the localityName field is, why we are removing it, and how this change is to the benefit of SSL Subscribers and Relying Parties.</itunes:summary>
      <itunes:subtitle>Sectigo is implementing an important change to its public-facing SSL certificate business, which we call State-Locality Exclusivity. This change removes a the localityName field, a very common field in SSL certificates. In this episode our hosts explain what the localityName field is, why we are removing it, and how this change is to the benefit of SSL Subscribers and Relying Parties.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1098811582</guid>
      <title>Root Causes 175: What Is a Linter?</title>
      <description><![CDATA[<p>Linters have been a standard programming tool for more than four decades. This venerable coding tool has recently taken on new significant in the world of public certificates. In this episode our hosts explain linters and how they are applied to SSL certificates.</p>
]]></description>
      <pubDate>Mon, 2 Aug 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Linters have been a standard programming tool for more than four decades. This venerable coding tool has recently taken on new significant in the world of public certificates. In this episode our hosts explain linters and how they are applied to SSL certificates.</p>
]]></content:encoded>
      <enclosure length="19719651" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/988e2a09-b11c-4d14-92d5-803ea5ce7de2/audio/fd1653c8-47eb-4a58-836e-4354b0795881/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 175: What Is a Linter?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/988e2a09-b11c-4d14-92d5-803ea5ce7de2/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:32</itunes:duration>
      <itunes:summary>Linters have been a standard programming tool for more than four decades. This venerable coding tool has recently taken on new significant in the world of public certificates. In this episode our hosts explain linters and how they are applied to SSL certificates.</itunes:summary>
      <itunes:subtitle>Linters have been a standard programming tool for more than four decades. This venerable coding tool has recently taken on new significant in the world of public certificates. In this episode our hosts explain linters and how they are applied to SSL certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1095187042</guid>
      <title>Root Causes 174: Windows 11 and TPMs</title>
      <description><![CDATA[<p>Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. TPM 2.0 enables more modern hashing and encryption algorithms than previous versions. Our hosts discuss the implications of this announcement.</p>
]]></description>
      <pubDate>Tue, 27 Jul 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. TPM 2.0 enables more modern hashing and encryption algorithms than previous versions. Our hosts discuss the implications of this announcement.</p>
]]></content:encoded>
      <enclosure length="15978031" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cd9ca4d1-7c1e-4c70-a23f-af6ef6ec5241/audio/2c558731-cb96-4d93-a912-80eddeafc9f4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 174: Windows 11 and TPMs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cd9ca4d1-7c1e-4c70-a23f-af6ef6ec5241/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:38</itunes:duration>
      <itunes:summary>Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. TPM 2.0 enables more modern hashing and encryption algorithms than previous versions. Our hosts discuss the implications of this announcement.</itunes:summary>
      <itunes:subtitle>Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. TPM 2.0 enables more modern hashing and encryption algorithms than previous versions. Our hosts discuss the implications of this announcement.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1092943198</guid>
      <title>Root Causes 173: Whitelisting and Blocklisting</title>
      <description><![CDATA[<p>Whitelisting and blocklisting are tried and true elements of the computer industry.  In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world.  We discuss fuzzy entities,  the scaling problem, layered defenses, and the trouble with active attackers.</p>
]]></description>
      <pubDate>Thu, 22 Jul 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Whitelisting and blocklisting are tried and true elements of the computer industry.  In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world.  We discuss fuzzy entities,  the scaling problem, layered defenses, and the trouble with active attackers.</p>
]]></content:encoded>
      <enclosure length="17649088" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e10ab544-a95e-43d2-b7b2-87fc9aa5e06b/audio/08174513-6ea2-440b-93a5-52e91321f5c8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 173: Whitelisting and Blocklisting</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e10ab544-a95e-43d2-b7b2-87fc9aa5e06b/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:22</itunes:duration>
      <itunes:summary>Whitelisting and blocklisting are tried and true elements of the computer industry.  In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world.  We discuss fuzzy entities,  the scaling problem, layered defenses, and the trouble with active attackers.</itunes:summary>
      <itunes:subtitle>Whitelisting and blocklisting are tried and true elements of the computer industry.  In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world.  We discuss fuzzy entities,  the scaling problem, layered defenses, and the trouble with active attackers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1086889342</guid>
      <title>Root Causes 172: What Is an NFT?</title>
      <description><![CDATA[<p>If you have paid any attention at all to popular media in the past few months, you will have heard about non-fungible tokens, or NFTs. NFTs are a method of uniquely identifying a digital asset using blockchain technology, and they are big news in the art and media world. Join our hosts as they explain the difference between fungible and non-fungible tokens, how NFTs work, and the significance of publicly asserting ownership for digital files.</p>
]]></description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>If you have paid any attention at all to popular media in the past few months, you will have heard about non-fungible tokens, or NFTs. NFTs are a method of uniquely identifying a digital asset using blockchain technology, and they are big news in the art and media world. Join our hosts as they explain the difference between fungible and non-fungible tokens, how NFTs work, and the significance of publicly asserting ownership for digital files.</p>
]]></content:encoded>
      <enclosure length="15818916" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/134014e8-3b02-47e0-bb0e-e35359546163/audio/53bb0a6d-5b26-4a59-a56a-a4ff1989bea2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 172: What Is an NFT?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/134014e8-3b02-47e0-bb0e-e35359546163/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:28</itunes:duration>
      <itunes:summary>If you have paid any attention at all to popular media in the past few months, you will have heard about non-fungible tokens, or NFTs. NFTs are a method of uniquely identifying a digital asset using blockchain technology, and they are big news in the art and media world. Join our hosts as they explain the difference between fungible and non-fungible tokens, how NFTs work, and the significance of publicly asserting ownership for digital files.</itunes:summary>
      <itunes:subtitle>If you have paid any attention at all to popular media in the past few months, you will have heard about non-fungible tokens, or NFTs. NFTs are a method of uniquely identifying a digital asset using blockchain technology, and they are big news in the art and media world. Join our hosts as they explain the difference between fungible and non-fungible tokens, how NFTs work, and the significance of publicly asserting ownership for digital files.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1083981928</guid>
      <title>Root Causes 171: The Off-by-One-Second Problem</title>
      <description><![CDATA[<p>Today our hosts explore an esoteric but important error in public certificates that we call the off-by-one-second problem. We explain this problem, how it occurs, and its broader implications.</p>
]]></description>
      <pubDate>Thu, 8 Jul 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Today our hosts explore an esoteric but important error in public certificates that we call the off-by-one-second problem. We explain this problem, how it occurs, and its broader implications.</p>
]]></content:encoded>
      <enclosure length="21306746" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3c61221e-1cd1-41bd-b1f9-1bf92f7dca1c/audio/fa3db2ee-5a57-405e-bf67-7245aa991321/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 171: The Off-by-One-Second Problem</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3c61221e-1cd1-41bd-b1f9-1bf92f7dca1c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:11</itunes:duration>
      <itunes:summary>Today our hosts explore an esoteric but important error in public certificates that we call the off-by-one-second problem. We explain this problem, how it occurs, and its broader implications.</itunes:summary>
      <itunes:subtitle>Today our hosts explore an esoteric but important error in public certificates that we call the off-by-one-second problem. We explain this problem, how it occurs, and its broader implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1082537503</guid>
      <title>Root Causes 170: Why Is Canada So Good at Cryptography?</title>
      <description><![CDATA[<p>In celebration of Canada Day, our hosts discuss why Canada in particular offers a disproportionately large contribution to cryptography. We examine historic reasons and the real-world consequences of Canada being a center for cryptographic excellence.</p>
]]></description>
      <pubDate>Thu, 1 Jul 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In celebration of Canada Day, our hosts discuss why Canada in particular offers a disproportionately large contribution to cryptography. We examine historic reasons and the real-world consequences of Canada being a center for cryptographic excellence.</p>
]]></content:encoded>
      <enclosure length="17820869" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/517870c0-9f4a-4427-b7eb-a0a206c6e97f/audio/af9dbee9-e88e-4a97-b4ce-886f61ba7eec/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 170: Why Is Canada So Good at Cryptography?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/517870c0-9f4a-4427-b7eb-a0a206c6e97f/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:33</itunes:duration>
      <itunes:summary>In celebration of Canada Day, our hosts discuss why Canada in particular offers a disproportionately large contribution to cryptography. We examine historic reasons and the real-world consequences of Canada being a center for cryptographic excellence.</itunes:summary>
      <itunes:subtitle>In celebration of Canada Day, our hosts discuss why Canada in particular offers a disproportionately large contribution to cryptography. We examine historic reasons and the real-world consequences of Canada being a center for cryptographic excellence.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1076052700</guid>
      <title>Root Causes 169: Bitcoin and the Anonymity Fallacy</title>
      <description><![CDATA[<p>In the developing story of the Colonial pipeline ransomware attack, the FBI recently recovered the ransom money, which had been paid in Bitcoin. In this episode we talk about how this recovery might have occurred.</p>
]]></description>
      <pubDate>Fri, 25 Jun 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the developing story of the Colonial pipeline ransomware attack, the FBI recently recovered the ransom money, which had been paid in Bitcoin. In this episode we talk about how this recovery might have occurred.</p>
]]></content:encoded>
      <enclosure length="22907591" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/03da48e0-b333-4da6-bc9e-804bf3e89f69/audio/b136c398-4c9c-4a04-bbbb-2a44be4879af/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 169: Bitcoin and the Anonymity Fallacy</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/03da48e0-b333-4da6-bc9e-804bf3e89f69/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:51</itunes:duration>
      <itunes:summary>In the developing story of the Colonial pipeline ransomware attack, the FBI recently recovered the ransom money, which had been paid in Bitcoin. In this episode we talk about how this recovery might have occurred.</itunes:summary>
      <itunes:subtitle>In the developing story of the Colonial pipeline ransomware attack, the FBI recently recovered the ransom money, which had been paid in Bitcoin. In this episode we talk about how this recovery might have occurred.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1073107552</guid>
      <title>Root Causes 168: The Difference Between e-Signing and Digital Signing</title>
      <description><![CDATA[<p>In our technology discussions we frequently run into confusion about the relationship between electronic document signing and digital document signing. Despite the similarity in names, they are entirely different technological approaches to providing trustworthy electronic signed documents. In this episode we explain the two terms, their distinct definitions, and some of the pros and cons of each approach.</p>
]]></description>
      <pubDate>Mon, 21 Jun 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our technology discussions we frequently run into confusion about the relationship between electronic document signing and digital document signing. Despite the similarity in names, they are entirely different technological approaches to providing trustworthy electronic signed documents. In this episode we explain the two terms, their distinct definitions, and some of the pros and cons of each approach.</p>
]]></content:encoded>
      <enclosure length="18332964" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/53679349-1e1a-4ed9-a3a3-884f052902e7/audio/dc3a2dfe-669d-4c92-876f-cfc12b6abf9a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 168: The Difference Between e-Signing and Digital Signing</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/53679349-1e1a-4ed9-a3a3-884f052902e7/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:05</itunes:duration>
      <itunes:summary>In our technology discussions we frequently run into confusion about the relationship between electronic document signing and digital document signing. Despite the similarity in names, they are entirely different technological approaches to providing trustworthy electronic signed documents. In this episode we explain the two terms, their distinct definitions, and some of the pros and cons of each approach.</itunes:summary>
      <itunes:subtitle>In our technology discussions we frequently run into confusion about the relationship between electronic document signing and digital document signing. Despite the similarity in names, they are entirely different technological approaches to providing trustworthy electronic signed documents. In this episode we explain the two terms, their distinct definitions, and some of the pros and cons of each approach.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1069762573</guid>
      <title>Root Causes 167: Colonial Pipeline Ransomware Attack</title>
      <description><![CDATA[<p>The recent ransomware attack against the Colonial pipeline has captured the news cycles in recent weeks. In this first episode of two our hosts begin to unpack what it known about this attack and how digital identity and PKI fit in.</p>
]]></description>
      <pubDate>Tue, 15 Jun 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recent ransomware attack against the Colonial pipeline has captured the news cycles in recent weeks. In this first episode of two our hosts begin to unpack what it known about this attack and how digital identity and PKI fit in.</p>
]]></content:encoded>
      <enclosure length="18835246" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6b0c21db-2b86-4f99-aeab-56c062d6370a/audio/a95ae5b3-713d-44a3-96dc-a2b8e77703e2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 167: Colonial Pipeline Ransomware Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6b0c21db-2b86-4f99-aeab-56c062d6370a/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:36</itunes:duration>
      <itunes:summary>The recent ransomware attack against the Colonial pipeline has captured the news cycles in recent weeks. In this first episode of two our hosts begin to unpack what it known about this attack and how digital identity and PKI fit in.</itunes:summary>
      <itunes:subtitle>The recent ransomware attack against the Colonial pipeline has captured the news cycles in recent weeks. In this first episode of two our hosts begin to unpack what it known about this attack and how digital identity and PKI fit in.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1064543272</guid>
      <title>Root Causes 166: The Trouble with OU Fields</title>
      <description><![CDATA[<p>Of all aspects of public SSL certificates, few are as controversial as the OU field. Standing for Organizational Unit, this field is beloved by a few enterprises and hated by security watchers. It's also under fire in the CA/Browser Forum. Join our hosts as they explain the history of the OU field and why it's an industry flashpoint, including their predictions for the future of the OU field.</p>
]]></description>
      <pubDate>Mon, 7 Jun 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Of all aspects of public SSL certificates, few are as controversial as the OU field. Standing for Organizational Unit, this field is beloved by a few enterprises and hated by security watchers. It's also under fire in the CA/Browser Forum. Join our hosts as they explain the history of the OU field and why it's an industry flashpoint, including their predictions for the future of the OU field.</p>
]]></content:encoded>
      <enclosure length="10000926" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8b1e0082-ae0d-4585-91d9-1138496976aa/audio/fddd29bf-e227-47aa-8bad-94bb82f11491/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 166: The Trouble with OU Fields</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8b1e0082-ae0d-4585-91d9-1138496976aa/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:24</itunes:duration>
      <itunes:summary>Of all aspects of public SSL certificates, few are as controversial as the OU field. Standing for Organizational Unit, this field is beloved by a few enterprises and hated by security watchers. It&apos;s also under fire in the CA/Browser Forum. Join our hosts as they explain the history of the OU field and why it&apos;s an industry flashpoint, including their predictions for the future of the OU field.</itunes:summary>
      <itunes:subtitle>Of all aspects of public SSL certificates, few are as controversial as the OU field. Standing for Organizational Unit, this field is beloved by a few enterprises and hated by security watchers. It&apos;s also under fire in the CA/Browser Forum. Join our hosts as they explain the history of the OU field and why it&apos;s an industry flashpoint, including their predictions for the future of the OU field.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1061246959</guid>
      <title>Root Causes 165: Blockchain - Proof of Work Versus Proof of Stake</title>
      <description><![CDATA[<p>In our ongoing examination of blockchain, we define proof of work and proof of stake as consensus algorithms for updating the public ledger. We explain their differences and get into the problems with proof of work and the reasons proof of stake is emerging as a promising new consensus algorithm. We touch on the consequences of these algorithms on other aspects of society as well.</p>
]]></description>
      <pubDate>Wed, 2 Jun 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing examination of blockchain, we define proof of work and proof of stake as consensus algorithms for updating the public ledger. We explain their differences and get into the problems with proof of work and the reasons proof of stake is emerging as a promising new consensus algorithm. We touch on the consequences of these algorithms on other aspects of society as well.</p>
]]></content:encoded>
      <enclosure length="25484145" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3da56150-7841-45f0-bf49-81bb82cbfade/audio/86df7190-0279-4d47-9174-aec860e52ead/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 165: Blockchain - Proof of Work Versus Proof of Stake</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3da56150-7841-45f0-bf49-81bb82cbfade/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:32</itunes:duration>
      <itunes:summary>In our ongoing examination of blockchain, we define proof of work and proof of stake as consensus algorithms for updating the public ledger. We explain their differences and get into the problems with proof of work and the reasons proof of stake is emerging as a promising new consensus algorithm. We touch on the consequences of these algorithms on other aspects of society as well.</itunes:summary>
      <itunes:subtitle>In our ongoing examination of blockchain, we define proof of work and proof of stake as consensus algorithms for updating the public ledger. We explain their differences and get into the problems with proof of work and the reasons proof of stake is emerging as a promising new consensus algorithm. We touch on the consequences of these algorithms on other aspects of society as well.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1052138143</guid>
      <title>Root Causes 164: Examining MFA Through out-of-Band Phone Calling</title>
      <description><![CDATA[<p>In our ongoing series of episodes on MFA, we explore the plusses and minuses of out-of-band phone calling. Our hosts explain how this form of MFA works, what attacks it defends against successfully, and what attacks can circumvent it.</p>
]]></description>
      <pubDate>Thu, 20 May 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing series of episodes on MFA, we explore the plusses and minuses of out-of-band phone calling. Our hosts explain how this form of MFA works, what attacks it defends against successfully, and what attacks can circumvent it.</p>
]]></content:encoded>
      <enclosure length="10130830" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8b82ada0-bc1b-4548-a3eb-6eda01b14880/audio/b8ba8846-bc4c-4cc9-8495-58257db06b4b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 164: Examining MFA Through out-of-Band Phone Calling</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8b82ada0-bc1b-4548-a3eb-6eda01b14880/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:32</itunes:duration>
      <itunes:summary>In our ongoing series of episodes on MFA, we explore the plusses and minuses of out-of-band phone calling. Our hosts explain how this form of MFA works, what attacks it defends against successfully, and what attacks can circumvent it.</itunes:summary>
      <itunes:subtitle>In our ongoing series of episodes on MFA, we explore the plusses and minuses of out-of-band phone calling. Our hosts explain how this form of MFA works, what attacks it defends against successfully, and what attacks can circumvent it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1048238821</guid>
      <title>Root Causes 163: What Puts the I in PKI?</title>
      <description><![CDATA[<p>PKI stands for Public Key Infrastructure. In this episode we focus on the word infrastructure. Our hosts discuss the key qualities of credential form factors, how they are separate and distinct from the infrastructure surrounding them, and the minimum capabilities necessary to refer to a public-private key system as PKI.</p>
]]></description>
      <pubDate>Wed, 12 May 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>PKI stands for Public Key Infrastructure. In this episode we focus on the word infrastructure. Our hosts discuss the key qualities of credential form factors, how they are separate and distinct from the infrastructure surrounding them, and the minimum capabilities necessary to refer to a public-private key system as PKI.</p>
]]></content:encoded>
      <enclosure length="12695380" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/164523c9-08cc-4a3a-ba49-e2e73eaa1681/audio/a80a066c-10d4-4b25-9046-8a393bb7141e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 163: What Puts the I in PKI?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/164523c9-08cc-4a3a-ba49-e2e73eaa1681/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:12</itunes:duration>
      <itunes:summary>PKI stands for Public Key Infrastructure. In this episode we focus on the word infrastructure. Our hosts discuss the key qualities of credential form factors, how they are separate and distinct from the infrastructure surrounding them, and the minimum capabilities necessary to refer to a public-private key system as PKI.</itunes:summary>
      <itunes:subtitle>PKI stands for Public Key Infrastructure. In this episode we focus on the word infrastructure. Our hosts discuss the key qualities of credential form factors, how they are separate and distinct from the infrastructure surrounding them, and the minimum capabilities necessary to refer to a public-private key system as PKI.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1034849710</guid>
      <title>Root Causes 162: What Is Sideloading?</title>
      <description><![CDATA[<p>In a recent interview Tim Cook took a strong stance against application sideloading as a danger to mobile devices. In this episode we explain sideloading, its potential dangers, and the underlying motivators behind the sideloading debate.</p>
]]></description>
      <pubDate>Wed, 21 Apr 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In a recent interview Tim Cook took a strong stance against application sideloading as a danger to mobile devices. In this episode we explain sideloading, its potential dangers, and the underlying motivators behind the sideloading debate.</p>
]]></content:encoded>
      <enclosure length="13045677" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/af7a7c43-47ea-42a1-bfa8-32452a85226e/audio/aef45b59-9dfb-45a5-a488-ad147d92a0e2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 162: What Is Sideloading?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/af7a7c43-47ea-42a1-bfa8-32452a85226e/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:34</itunes:duration>
      <itunes:summary>In a recent interview Tim Cook took a strong stance against application sideloading as a danger to mobile devices. In this episode we explain sideloading, its potential dangers, and the underlying motivators behind the sideloading debate.</itunes:summary>
      <itunes:subtitle>In a recent interview Tim Cook took a strong stance against application sideloading as a danger to mobile devices. In this episode we explain sideloading, its potential dangers, and the underlying motivators behind the sideloading debate.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1031071930</guid>
      <title>Root Causes 161: Consensus Algorithms and the Byzantine Generals Problem</title>
      <description><![CDATA[<p>If you pay attention to blockchain and crypto currency, you are sure to hear the phrase consensus algorithm.  This concept is fundamental to distributed trust systems like blockchain. In this episode our hosts explain consensus, proof of work, and the Byzantine Generals problem.</p>
]]></description>
      <pubDate>Thu, 15 Apr 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>If you pay attention to blockchain and crypto currency, you are sure to hear the phrase consensus algorithm.  This concept is fundamental to distributed trust systems like blockchain. In this episode our hosts explain consensus, proof of work, and the Byzantine Generals problem.</p>
]]></content:encoded>
      <enclosure length="21170736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e6f745bd-c3ff-46c2-b821-904578bae8d9/audio/597145ef-6c6f-4574-82d5-9e0bfdfd16de/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 161: Consensus Algorithms and the Byzantine Generals Problem</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e6f745bd-c3ff-46c2-b821-904578bae8d9/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:02</itunes:duration>
      <itunes:summary>If you pay attention to blockchain and crypto currency, you are sure to hear the phrase consensus algorithm.  This concept is fundamental to distributed trust systems like blockchain. In this episode our hosts explain consensus, proof of work, and the Byzantine Generals problem.</itunes:summary>
      <itunes:subtitle>If you pay attention to blockchain and crypto currency, you are sure to hear the phrase consensus algorithm.  This concept is fundamental to distributed trust systems like blockchain. In this episode our hosts explain consensus, proof of work, and the Byzantine Generals problem.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1026214003</guid>
      <title>Root Causes 160: Purpose-built Quantum Computers for Breaking RSA</title>
      <description><![CDATA[<p>A new academic paper has described how a purpose-built quantum computer could break RSA encryption in fewer qbits than commonly are thought necessary possible. In this episode our hosts summarize the basic argument in this highly technical paper and its potential implications on the Quantum Apocalypse.</p>
]]></description>
      <pubDate>Thu, 8 Apr 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new academic paper has described how a purpose-built quantum computer could break RSA encryption in fewer qbits than commonly are thought necessary possible. In this episode our hosts summarize the basic argument in this highly technical paper and its potential implications on the Quantum Apocalypse.</p>
]]></content:encoded>
      <enclosure length="12911032" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ea1c2e2-1c9e-4ff0-a824-0c208b84732b/audio/a3c4bcf9-5ea2-42dd-b7cf-2a6105d0e0a9/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 160: Purpose-built Quantum Computers for Breaking RSA</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ea1c2e2-1c9e-4ff0-a824-0c208b84732b/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:26</itunes:duration>
      <itunes:summary>A new academic paper has described how a purpose-built quantum computer could break RSA encryption in fewer qbits than commonly are thought necessary possible. In this episode our hosts summarize the basic argument in this highly technical paper and its potential implications on the Quantum Apocalypse.</itunes:summary>
      <itunes:subtitle>A new academic paper has described how a purpose-built quantum computer could break RSA encryption in fewer qbits than commonly are thought necessary possible. In this episode our hosts summarize the basic argument in this highly technical paper and its potential implications on the Quantum Apocalypse.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1019864623</guid>
      <title>Root Causes 159: Encrypted Communication Provider Indicted for Drug Trafficking and Money Laundering</title>
      <description><![CDATA[<p>The CEO of Sky Global, a provider of encrypted data devices and services, has been indicted on RICO charges related to drug trafficking and money laundering. Our hosts discuss this highly unusual development and where it fits into the ongoing battle between law enforcement and encryption technology.</p>
]]></description>
      <pubDate>Wed, 31 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The CEO of Sky Global, a provider of encrypted data devices and services, has been indicted on RICO charges related to drug trafficking and money laundering. Our hosts discuss this highly unusual development and where it fits into the ongoing battle between law enforcement and encryption technology.</p>
]]></content:encoded>
      <enclosure length="14811493" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/facc6f44-6780-4246-9adc-eee8968f1f21/audio/43b69fa3-4932-4b73-a3dc-5c8ee0a21b2f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 159: Encrypted Communication Provider Indicted for Drug Trafficking and Money Laundering</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/facc6f44-6780-4246-9adc-eee8968f1f21/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:25</itunes:duration>
      <itunes:summary>The CEO of Sky Global, a provider of encrypted data devices and services, has been indicted on RICO charges related to drug trafficking and money laundering. Our hosts discuss this highly unusual development and where it fits into the ongoing battle between law enforcement and encryption technology.</itunes:summary>
      <itunes:subtitle>The CEO of Sky Global, a provider of encrypted data devices and services, has been indicted on RICO charges related to drug trafficking and money laundering. Our hosts discuss this highly unusual development and where it fits into the ongoing battle between law enforcement and encryption technology.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1015493497</guid>
      <title>Root Causes 158: Exchange Server Vulnerabilities</title>
      <description><![CDATA[<p>The ongoing Microsoft Exchange vulnerability is huge news in the IT world. In this episode our hosts discuss the reasons why on-premises services might present greater risk than providing the same capabilities in the cloud.</p>
]]></description>
      <pubDate>Tue, 23 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The ongoing Microsoft Exchange vulnerability is huge news in the IT world. In this episode our hosts discuss the reasons why on-premises services might present greater risk than providing the same capabilities in the cloud.</p>
]]></content:encoded>
      <enclosure length="12606002" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f10d77b8-4641-47d8-8abd-7748f0430dcc/audio/0c019324-8f0f-49b3-bfa2-873f2d18f2a5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 158: Exchange Server Vulnerabilities</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f10d77b8-4641-47d8-8abd-7748f0430dcc/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:07</itunes:duration>
      <itunes:summary>The ongoing Microsoft Exchange vulnerability is huge news in the IT world. In this episode our hosts discuss the reasons why on-premises services might present greater risk than providing the same capabilities in the cloud.</itunes:summary>
      <itunes:subtitle>The ongoing Microsoft Exchange vulnerability is huge news in the IT world. In this episode our hosts discuss the reasons why on-premises services might present greater risk than providing the same capabilities in the cloud.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1011417391</guid>
      <title>Root Causes 157: New Revocation Research</title>
      <description><![CDATA[<p>A recently published study of public revocation information takes a numerical approach to revocation behavior from CAs. Our hosts give their first take on this paper and the idea of &quot;revocation transparency.&quot;</p>
]]></description>
      <pubDate>Fri, 19 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recently published study of public revocation information takes a numerical approach to revocation behavior from CAs. Our hosts give their first take on this paper and the idea of &quot;revocation transparency.&quot;</p>
]]></content:encoded>
      <enclosure length="11192339" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cea259ca-b8ae-45ca-b9c6-16f78fbba69b/audio/4bb8e5dd-7bd6-4189-9df2-211fea2ab88e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 157: New Revocation Research</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cea259ca-b8ae-45ca-b9c6-16f78fbba69b/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:39</itunes:duration>
      <itunes:summary>A recently published study of public revocation information takes a numerical approach to revocation behavior from CAs. Our hosts give their first take on this paper and the idea of &quot;revocation transparency.&quot;</itunes:summary>
      <itunes:subtitle>A recently published study of public revocation information takes a numerical approach to revocation behavior from CAs. Our hosts give their first take on this paper and the idea of &quot;revocation transparency.&quot;</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1009355683</guid>
      <title>Root Causes 156: Kazakhstan Root Attack Revisited</title>
      <description><![CDATA[<p>In the summer of 2019 the Kazakh government attempted to force its citizens to trust its private root, enabling MITM attacks for a variety of potentially nefarious purposes. A recent research paper goes into previously unknown detail about who was targeted and how the regime sought to abuse this short-lived exploit.</p>
]]></description>
      <pubDate>Tue, 16 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the summer of 2019 the Kazakh government attempted to force its citizens to trust its private root, enabling MITM attacks for a variety of potentially nefarious purposes. A recent research paper goes into previously unknown detail about who was targeted and how the regime sought to abuse this short-lived exploit.</p>
]]></content:encoded>
      <enclosure length="17710760" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e052c79e-764a-4d80-b585-bf878c5dc5c3/audio/a1fcaf87-102e-484c-ad50-80946c46acdd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 156: Kazakhstan Root Attack Revisited</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e052c79e-764a-4d80-b585-bf878c5dc5c3/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:26</itunes:duration>
      <itunes:summary>In the summer of 2019 the Kazakh government attempted to force its citizens to trust its private root, enabling MITM attacks for a variety of potentially nefarious purposes. A recent research paper goes into previously unknown detail about who was targeted and how the regime sought to abuse this short-lived exploit.</itunes:summary>
      <itunes:subtitle>In the summer of 2019 the Kazakh government attempted to force its citizens to trust its private root, enabling MITM attacks for a variety of potentially nefarious purposes. A recent research paper goes into previously unknown detail about who was targeted and how the regime sought to abuse this short-lived exploit.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1004942434</guid>
      <title>Root Causes 155: What’s Good for Subscribers Is Good for Relying Parties</title>
      <description><![CDATA[<p>In this episode we explore the relationship between Relying Parties (aka users of online services) and Certificate Subscribers (aka providers of these services). We discuss the common attitude that certificate requirements that negatively impact Subscribers are inconsequential. We explain the downstream effects of certificate incidents and why unthinkingly forcing rules on service providers without considering the full consequences is detrimental to everyone.</p>
]]></description>
      <pubDate>Thu, 11 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode we explore the relationship between Relying Parties (aka users of online services) and Certificate Subscribers (aka providers of these services). We discuss the common attitude that certificate requirements that negatively impact Subscribers are inconsequential. We explain the downstream effects of certificate incidents and why unthinkingly forcing rules on service providers without considering the full consequences is detrimental to everyone.</p>
]]></content:encoded>
      <enclosure length="14747578" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d7daa751-1322-41e1-b6b4-59e2dda1bbe4/audio/9e0248a9-bcde-4223-9329-5c28b18498fd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 155: What’s Good for Subscribers Is Good for Relying Parties</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d7daa751-1322-41e1-b6b4-59e2dda1bbe4/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:21</itunes:duration>
      <itunes:summary>In this episode we explore the relationship between Relying Parties (aka users of online services) and Certificate Subscribers (aka providers of these services). We discuss the common attitude that certificate requirements that negatively impact Subscribers are inconsequential. We explain the downstream effects of certificate incidents and why unthinkingly forcing rules on service providers without considering the full consequences is detrimental to everyone.</itunes:summary>
      <itunes:subtitle>In this episode we explore the relationship between Relying Parties (aka users of online services) and Certificate Subscribers (aka providers of these services). We discuss the common attitude that certificate requirements that negatively impact Subscribers are inconsequential. We explain the downstream effects of certificate incidents and why unthinkingly forcing rules on service providers without considering the full consequences is detrimental to everyone.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1001395021</guid>
      <title>Root Causes 154: Did Claus Peter Schnorr Just Break RSA?</title>
      <description><![CDATA[<p>A recently published paper by a reputable German mathematician and cryptographer has garnered widespread attention for its claim to have destroyed the RSA algorithm. However, many people are skeptical. Join us as we discuss the paper's content, the proposed methodology, and the public discussion it has generated.</p>
]]></description>
      <pubDate>Mon, 8 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recently published paper by a reputable German mathematician and cryptographer has garnered widespread attention for its claim to have destroyed the RSA algorithm. However, many people are skeptical. Join us as we discuss the paper's content, the proposed methodology, and the public discussion it has generated.</p>
]]></content:encoded>
      <enclosure length="17055468" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2f9c0827-edd5-4b36-bbda-92977994ae00/audio/c1e7e808-6344-496d-9700-b958ff7b6ba4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 154: Did Claus Peter Schnorr Just Break RSA?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2f9c0827-edd5-4b36-bbda-92977994ae00/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:45</itunes:duration>
      <itunes:summary>A recently published paper by a reputable German mathematician and cryptographer has garnered widespread attention for its claim to have destroyed the RSA algorithm. However, many people are skeptical. Join us as we discuss the paper&apos;s content, the proposed methodology, and the public discussion it has generated.</itunes:summary>
      <itunes:subtitle>A recently published paper by a reputable German mathematician and cryptographer has garnered widespread attention for its claim to have destroyed the RSA algorithm. However, many people are skeptical. Join us as we discuss the paper&apos;s content, the proposed methodology, and the public discussion it has generated.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/999359203</guid>
      <title>Root Causes 153: Too Many Roots</title>
      <description><![CDATA[<p>Trust models in multi-vendor environments can be particularly tricky.<br />
We are joined once again by Tom Tansy, Chairman of the SunSpec Alliance for a deep dive in the challenges and best practices in maintaining trusted roots in complex, global supply chain ecosystems.</p>
]]></description>
      <pubDate>Fri, 5 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Trust models in multi-vendor environments can be particularly tricky.<br />
We are joined once again by Tom Tansy, Chairman of the SunSpec Alliance for a deep dive in the challenges and best practices in maintaining trusted roots in complex, global supply chain ecosystems.</p>
]]></content:encoded>
      <enclosure length="22439232" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4559c197-fd29-4252-8325-2e302f7852bf/audio/c2889593-d767-4fa5-b351-84beac95cddd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 153: Too Many Roots</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4559c197-fd29-4252-8325-2e302f7852bf/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:21</itunes:duration>
      <itunes:summary>Trust models in multi-vendor environments can be particularly tricky. 
 We are joined once again by Tom Tansy, Chairman of the SunSpec Alliance for a deep dive in the challenges and best practices in maintaining trusted roots in complex, global supply chain ecosystems.</itunes:summary>
      <itunes:subtitle>Trust models in multi-vendor environments can be particularly tricky. 
 We are joined once again by Tom Tansy, Chairman of the SunSpec Alliance for a deep dive in the challenges and best practices in maintaining trusted roots in complex, global supply chain ecosystems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/997187194</guid>
      <title>Root Causes 152: Digital Certificates and the SunSpec Alliance</title>
      <description><![CDATA[<p>The SunSpec Alliance is an important source of standards for clean energy infrastructure including solar and electric vehicles. To protect our electrical infrastructure and ensure proper functioning, digital identity and certificates are a necessity. Join us and guest Tom Tansy as we discuss how SunSpec employs PKI to this end.</p>
]]></description>
      <pubDate>Tue, 2 Mar 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The SunSpec Alliance is an important source of standards for clean energy infrastructure including solar and electric vehicles. To protect our electrical infrastructure and ensure proper functioning, digital identity and certificates are a necessity. Join us and guest Tom Tansy as we discuss how SunSpec employs PKI to this end.</p>
]]></content:encoded>
      <enclosure length="20843787" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/83b23110-6a59-4631-9821-b8d3d42738bb/audio/378683be-5229-46d1-8cea-ffb6e1780880/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 152: Digital Certificates and the SunSpec Alliance</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/83b23110-6a59-4631-9821-b8d3d42738bb/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:42</itunes:duration>
      <itunes:summary>The SunSpec Alliance is an important source of standards for clean energy infrastructure including solar and electric vehicles. To protect our electrical infrastructure and ensure proper functioning, digital identity and certificates are a necessity. Join us and guest Tom Tansy as we discuss how SunSpec employs PKI to this end.</itunes:summary>
      <itunes:subtitle>The SunSpec Alliance is an important source of standards for clean energy infrastructure including solar and electric vehicles. To protect our electrical infrastructure and ensure proper functioning, digital identity and certificates are a necessity. Join us and guest Tom Tansy as we discuss how SunSpec employs PKI to this end.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/990798334</guid>
      <title>Root Causes 151: What Is Rustls?</title>
      <description><![CDATA[<p>Rustls is an important emerging alternative to OpenSSL. In this episode we discuss the Rust programming language and the implications of the fact that is was designed with security in mind from the ground up. This includes how Rustls is protected against attack vectors that have been effective in the past, including Heartbleed. Join us to learn more.</p>
]]></description>
      <pubDate>Mon, 22 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Rustls is an important emerging alternative to OpenSSL. In this episode we discuss the Rust programming language and the implications of the fact that is was designed with security in mind from the ground up. This includes how Rustls is protected against attack vectors that have been effective in the past, including Heartbleed. Join us to learn more.</p>
]]></content:encoded>
      <enclosure length="14376276" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d87c3191-4846-45b0-b90d-08b140753443/audio/086068c6-a8bd-4854-a80c-d42e63ac965b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 151: What Is Rustls?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d87c3191-4846-45b0-b90d-08b140753443/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:58</itunes:duration>
      <itunes:summary>Rustls is an important emerging alternative to OpenSSL. In this episode we discuss the Rust programming language and the implications of the fact that is was designed with security in mind from the ground up. This includes how Rustls is protected against attack vectors that have been effective in the past, including Heartbleed. Join us to learn more.</itunes:summary>
      <itunes:subtitle>Rustls is an important emerging alternative to OpenSSL. In this episode we discuss the Rust programming language and the implications of the fact that is was designed with security in mind from the ground up. This includes how Rustls is protected against attack vectors that have been effective in the past, including Heartbleed. Join us to learn more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/986925886</guid>
      <title>Root Causes 150: This Podcast Is Not About Alan Turing</title>
      <description><![CDATA[<p>Recent news of the discovery of abandoned Enigma machines on the ocean floor inspires our hosts to discuss history's most famous code system, how it was broken, and how that relates to cryptography today.</p>
]]></description>
      <pubDate>Sun, 14 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent news of the discovery of abandoned Enigma machines on the ocean floor inspires our hosts to discuss history's most famous code system, how it was broken, and how that relates to cryptography today.</p>
]]></content:encoded>
      <enclosure length="16042711" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ec454d0b-cd3e-4b1d-936f-43cd73d693b5/audio/23c92f97-43c6-4967-ba42-30503b2d7f43/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 150: This Podcast Is Not About Alan Turing</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ec454d0b-cd3e-4b1d-936f-43cd73d693b5/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:42</itunes:duration>
      <itunes:summary>Recent news of the discovery of abandoned Enigma machines on the ocean floor inspires our hosts to discuss history&apos;s most famous code system, how it was broken, and how that relates to cryptography today.</itunes:summary>
      <itunes:subtitle>Recent news of the discovery of abandoned Enigma machines on the ocean floor inspires our hosts to discuss history&apos;s most famous code system, how it was broken, and how that relates to cryptography today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/983684926</guid>
      <title>Root Causes 149:  Municipal Water Poisoning Through Cyber Attack</title>
      <description><![CDATA[<p>In past episodes we have discussed the possibility of cyber attack against civil infrastructure like utilities. That possibility recently became real with the attempted poisoning of a Florida city's water supply through online security breach. Learn more on this episode.</p>
]]></description>
      <pubDate>Thu, 11 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In past episodes we have discussed the possibility of cyber attack against civil infrastructure like utilities. That possibility recently became real with the attempted poisoning of a Florida city's water supply through online security breach. Learn more on this episode.</p>
]]></content:encoded>
      <enclosure length="11089100" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/422e4f70-3e2b-4813-8d02-09cbbc9900cd/audio/c44ad382-df61-4ed5-bd2c-c773b0440b22/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 149:  Municipal Water Poisoning Through Cyber Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/422e4f70-3e2b-4813-8d02-09cbbc9900cd/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:32</itunes:duration>
      <itunes:summary>In past episodes we have discussed the possibility of cyber attack against civil infrastructure like utilities. That possibility recently became real with the attempted poisoning of a Florida city&apos;s water supply through online security breach. Learn more on this episode.</itunes:summary>
      <itunes:subtitle>In past episodes we have discussed the possibility of cyber attack against civil infrastructure like utilities. That possibility recently became real with the attempted poisoning of a Florida city&apos;s water supply through online security breach. Learn more on this episode.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/981539350</guid>
      <title>Root Causes 148: Can Australia Force Sites to Pay for Linking to Content?</title>
      <description><![CDATA[<p>A proposed law in Australia would require sites linking to news articles to pay for the right to link to these articles. While this law appears to be aimed at Google and Facebook, it has implications that are much bigger than these two news aggregators. Google has upped the ante by offering to cease operations in Australia before doing so. In this episode we discuss this ongoing development and where things go from here.</p>
]]></description>
      <pubDate>Mon, 8 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A proposed law in Australia would require sites linking to news articles to pay for the right to link to these articles. While this law appears to be aimed at Google and Facebook, it has implications that are much bigger than these two news aggregators. Google has upped the ante by offering to cease operations in Australia before doing so. In this episode we discuss this ongoing development and where things go from here.</p>
]]></content:encoded>
      <enclosure length="15604681" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/58728211-24fe-4b6e-8c1b-e62969da25f4/audio/6208dea3-1377-4303-b1bd-7ef8b51cabf4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 148: Can Australia Force Sites to Pay for Linking to Content?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/58728211-24fe-4b6e-8c1b-e62969da25f4/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:14</itunes:duration>
      <itunes:summary>A proposed law in Australia would require sites linking to news articles to pay for the right to link to these articles. While this law appears to be aimed at Google and Facebook, it has implications that are much bigger than these two news aggregators. Google has upped the ante by offering to cease operations in Australia before doing so. In this episode we discuss this ongoing development and where things go from here.</itunes:summary>
      <itunes:subtitle>A proposed law in Australia would require sites linking to news articles to pay for the right to link to these articles. While this law appears to be aimed at Google and Facebook, it has implications that are much bigger than these two news aggregators. Google has upped the ante by offering to cease operations in Australia before doing so. In this episode we discuss this ongoing development and where things go from here.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/979710295</guid>
      <title>Root Causes 147: Google Titan Secure Key Attack</title>
      <description><![CDATA[<p>Recent research reveals a possible attack that would allow the cloning of the Google Titan secure key. Join our hosts and guest Alan Grau as they describe this attack and its implications for Titan and other secure keys.</p>
]]></description>
      <pubDate>Fri, 5 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent research reveals a possible attack that would allow the cloning of the Google Titan secure key. Join our hosts and guest Alan Grau as they describe this attack and its implications for Titan and other secure keys.</p>
]]></content:encoded>
      <enclosure length="11772402" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cd74ebf4-d09f-4fb8-ac33-d8d74018f885/audio/14c735ee-b349-4be1-9b9c-9cbd9e6671e6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 147: Google Titan Secure Key Attack</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cd74ebf4-d09f-4fb8-ac33-d8d74018f885/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:15</itunes:duration>
      <itunes:summary>Recent research reveals a possible attack that would allow the cloning of the Google Titan secure key. Join our hosts and guest Alan Grau as they describe this attack and its implications for Titan and other secure keys.</itunes:summary>
      <itunes:subtitle>Recent research reveals a possible attack that would allow the cloning of the Google Titan secure key. Join our hosts and guest Alan Grau as they describe this attack and its implications for Titan and other secure keys.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/977197381</guid>
      <title>Root Causes 146 : Congolese ccTLD Takeover</title>
      <description><![CDATA[<p>A white hat researcher recently took over .cd, the Democratic Republic of the Congo's ccTLD. The implications of taking over a top-level TLD are of course staggering. Join our hosts as we describe how this feat was accomplished and the many malicious activities that could occur under such circumstances.</p>
]]></description>
      <pubDate>Mon, 1 Feb 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A white hat researcher recently took over .cd, the Democratic Republic of the Congo's ccTLD. The implications of taking over a top-level TLD are of course staggering. Join our hosts as we describe how this feat was accomplished and the many malicious activities that could occur under such circumstances.</p>
]]></content:encoded>
      <enclosure length="9441868" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4d74dd60-50f8-4769-a162-fa8a73968742/audio/2dc586c7-8f88-44a4-bab7-cd769909dc11/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 146 : Congolese ccTLD Takeover</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4d74dd60-50f8-4769-a162-fa8a73968742/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:49</itunes:duration>
      <itunes:summary>A white hat researcher recently took over .cd, the Democratic Republic of the Congo&apos;s ccTLD. The implications of taking over a top-level TLD are of course staggering. Join our hosts as we describe how this feat was accomplished and the many malicious activities that could occur under such circumstances.</itunes:summary>
      <itunes:subtitle>A white hat researcher recently took over .cd, the Democratic Republic of the Congo&apos;s ccTLD. The implications of taking over a top-level TLD are of course staggering. Join our hosts as we describe how this feat was accomplished and the many malicious activities that could occur under such circumstances.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/975392824</guid>
      <title>Root Causes 145: Google Chrome to Distrust CA Camerfirma</title>
      <description><![CDATA[<p>A few days ago Google announced that Chrome will distrust Spanish public CA Camerfirma in its upcoming build 90. Our hosts go over the history of browsers distrusting public CAs and explain the reasons for (and implications of) this decision.</p>
]]></description>
      <pubDate>Thu, 28 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A few days ago Google announced that Chrome will distrust Spanish public CA Camerfirma in its upcoming build 90. Our hosts go over the history of browsers distrusting public CAs and explain the reasons for (and implications of) this decision.</p>
]]></content:encoded>
      <enclosure length="10765958" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/8c009737-2868-4fd5-90a0-7493d20175f3/audio/158de6e9-7077-4f13-839e-018a05eff33a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 145: Google Chrome to Distrust CA Camerfirma</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/8c009737-2868-4fd5-90a0-7493d20175f3/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:12</itunes:duration>
      <itunes:summary>A few days ago Google announced that Chrome will distrust Spanish public CA Camerfirma in its upcoming build 90. Our hosts go over the history of browsers distrusting public CAs and explain the reasons for (and implications of) this decision.</itunes:summary>
      <itunes:subtitle>A few days ago Google announced that Chrome will distrust Spanish public CA Camerfirma in its upcoming build 90. Our hosts go over the history of browsers distrusting public CAs and explain the reasons for (and implications of) this decision.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/973295860</guid>
      <title>Root Causes 144: Whatever Happened to the Green Address Bar?</title>
      <description><![CDATA[<p>For more than a decade browsers displayed the &quot;green address bar&quot; on sites that had undergone the high authentication required for EV SSL certificates. But in recent years the identity information in the browser has has shrunk, lost its color, and in some cases disappeared entirely. In this episode our hosts walk you through the history of how the green address bar came to be and how browsers gradually reduced and then removed it.</p>
]]></description>
      <pubDate>Mon, 25 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For more than a decade browsers displayed the &quot;green address bar&quot; on sites that had undergone the high authentication required for EV SSL certificates. But in recent years the identity information in the browser has has shrunk, lost its color, and in some cases disappeared entirely. In this episode our hosts walk you through the history of how the green address bar came to be and how browsers gradually reduced and then removed it.</p>
]]></content:encoded>
      <enclosure length="13047617" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/37784c07-fbb9-4423-b000-7c899c655978/audio/75895b0b-c28a-4706-b956-da1c6e722441/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 144: Whatever Happened to the Green Address Bar?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/37784c07-fbb9-4423-b000-7c899c655978/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:35</itunes:duration>
      <itunes:summary>For more than a decade browsers displayed the &quot;green address bar&quot; on sites that had undergone the high authentication required for EV SSL certificates. But in recent years the identity information in the browser has has shrunk, lost its color, and in some cases disappeared entirely. In this episode our hosts walk you through the history of how the green address bar came to be and how browsers gradually reduced and then removed it.</itunes:summary>
      <itunes:subtitle>For more than a decade browsers displayed the &quot;green address bar&quot; on sites that had undergone the high authentication required for EV SSL certificates. But in recent years the identity information in the browser has has shrunk, lost its color, and in some cases disappeared entirely. In this episode our hosts walk you through the history of how the green address bar came to be and how browsers gradually reduced and then removed it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/970133992</guid>
      <title>Root Causes 143: The Four Pillars of Certificate Automation</title>
      <description><![CDATA[<p>In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pillars entail and why they're important. They also discuss the umbrella capability of visibility, which affects all four pillars.</p>
]]></description>
      <pubDate>Thu, 21 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pillars entail and why they're important. They also discuss the umbrella capability of visibility, which affects all four pillars.</p>
]]></content:encoded>
      <enclosure length="26778829" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9d6a964f-4a5b-4068-ace6-f5476ba13ec3/audio/54c22054-f4a3-4f1e-8e2b-7ed054ab3dea/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 143: The Four Pillars of Certificate Automation</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9d6a964f-4a5b-4068-ace6-f5476ba13ec3/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:53</itunes:duration>
      <itunes:summary>In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pillars entail and why they&apos;re important. They also discuss the umbrella capability of visibility, which affects all four pillars.</itunes:summary>
      <itunes:subtitle>In this episode our hosts explain the Four Pillars of Certificate Automation: deploy, discover, revoke/replace, and renew. They detail what these pillars entail and why they&apos;re important. They also discuss the umbrella capability of visibility, which affects all four pillars.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/968048287</guid>
      <title>Root Causes 142: Removing Street Address and Postal Code from Public Certificates</title>
      <description><![CDATA[<p>On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain the reasons for and advantages of this upcoming change, along with answers to some of the common questions we receive.</p>
]]></description>
      <pubDate>Mon, 18 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain the reasons for and advantages of this upcoming change, along with answers to some of the common questions we receive.</p>
]]></content:encoded>
      <enclosure length="11834259" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2222abc7-48c3-48c9-9326-82c903299023/audio/30ba3bae-a918-4000-bb91-834b0c7e6b90/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 142: Removing Street Address and Postal Code from Public Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2222abc7-48c3-48c9-9326-82c903299023/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:19</itunes:duration>
      <itunes:summary>On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain the reasons for and advantages of this upcoming change, along with answers to some of the common questions we receive.</itunes:summary>
      <itunes:subtitle>On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain the reasons for and advantages of this upcoming change, along with answers to some of the common questions we receive.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/963715132</guid>
      <title>Root Causes 141: The Case for Shorter Certificate Lifespans</title>
      <description><![CDATA[<p>Recent years have seen multiple reductions in the maximum term for public SSL certificates. Our hosts are joined by guest Nick France to discuss the benefits of shorter certificate lifespans for both public and private CAs.</p>
]]></description>
      <pubDate>Mon, 11 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent years have seen multiple reductions in the maximum term for public SSL certificates. Our hosts are joined by guest Nick France to discuss the benefits of shorter certificate lifespans for both public and private CAs.</p>
]]></content:encoded>
      <enclosure length="17860547" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e8326ae4-84ce-4a7e-8b13-42b2ced2f316/audio/95aa34e6-3099-49b4-a33c-aa297b092f7d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 141: The Case for Shorter Certificate Lifespans</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e8326ae4-84ce-4a7e-8b13-42b2ced2f316/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:35</itunes:duration>
      <itunes:summary>Recent years have seen multiple reductions in the maximum term for public SSL certificates. Our hosts are joined by guest Nick France to discuss the benefits of shorter certificate lifespans for both public and private CAs.</itunes:summary>
      <itunes:subtitle>Recent years have seen multiple reductions in the maximum term for public SSL certificates. Our hosts are joined by guest Nick France to discuss the benefits of shorter certificate lifespans for both public and private CAs.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/961017160</guid>
      <title>Root Causes 140: SSL Attacks Using BGP (Border Gateway Protocol)</title>
      <description><![CDATA[<p>BGP, or Border Gateway Protocol, controls traffic routing on the internet. Real and theoretical attacks over the years have been revealed against BGP with varying levels of success, including recent research on how BGP attacks can be used to improperly obtain DV certificates. Our hosts explain them along with recent industry actions intended to thwart such attacks.</p>
]]></description>
      <pubDate>Wed, 6 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>BGP, or Border Gateway Protocol, controls traffic routing on the internet. Real and theoretical attacks over the years have been revealed against BGP with varying levels of success, including recent research on how BGP attacks can be used to improperly obtain DV certificates. Our hosts explain them along with recent industry actions intended to thwart such attacks.</p>
]]></content:encoded>
      <enclosure length="19267650" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9732f40b-d53e-4b2d-86d2-18b941cee64f/audio/65f24417-f8b6-44ee-8d7d-6ccb519837bf/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 140: SSL Attacks Using BGP (Border Gateway Protocol)</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9732f40b-d53e-4b2d-86d2-18b941cee64f/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:03</itunes:duration>
      <itunes:summary>BGP, or Border Gateway Protocol, controls traffic routing on the internet. Real and theoretical attacks over the years have been revealed against BGP with varying levels of success, including recent research on how BGP attacks can be used to improperly obtain DV certificates. Our hosts explain them along with recent industry actions intended to thwart such attacks.</itunes:summary>
      <itunes:subtitle>BGP, or Border Gateway Protocol, controls traffic routing on the internet. Real and theoretical attacks over the years have been revealed against BGP with varying levels of success, including recent research on how BGP attacks can be used to improperly obtain DV certificates. Our hosts explain them along with recent industry actions intended to thwart such attacks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/959234719</guid>
      <title>Root Causes 139: Exposed Private Keys in CSR Submissions</title>
      <description><![CDATA[<p>Public CAs recently have discovered a repeated error whereby certificate subscribers accidentally include the private key along with CSR submissions. Our hosts break down this phenomenon and its implications.</p>
]]></description>
      <pubDate>Sun, 3 Jan 2021 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Public CAs recently have discovered a repeated error whereby certificate subscribers accidentally include the private key along with CSR submissions. Our hosts break down this phenomenon and its implications.</p>
]]></content:encoded>
      <enclosure length="9782084" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/79f10a45-66ce-4cbb-af10-ddd81b9c6594/audio/9e994286-439a-42c6-b9f9-dffe9d9e78ce/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 139: Exposed Private Keys in CSR Submissions</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/79f10a45-66ce-4cbb-af10-ddd81b9c6594/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:10</itunes:duration>
      <itunes:summary>Public CAs recently have discovered a repeated error whereby certificate subscribers accidentally include the private key along with CSR submissions. Our hosts break down this phenomenon and its implications.</itunes:summary>
      <itunes:subtitle>Public CAs recently have discovered a repeated error whereby certificate subscribers accidentally include the private key along with CSR submissions. Our hosts break down this phenomenon and its implications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/955945006</guid>
      <title>Root Causes 138: IoT Cybersecurity Improvement Act of 2020</title>
      <description><![CDATA[<p>A new US law called the IoT Cybersecurity Improvement Act of 2020 creates security requirements for IoT devices sold into the US government. Join us as we explain these new requirements and why this law's reach is likely to extend further than the US governmental procurement process.</p>
]]></description>
      <pubDate>Sun, 27 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new US law called the IoT Cybersecurity Improvement Act of 2020 creates security requirements for IoT devices sold into the US government. Join us as we explain these new requirements and why this law's reach is likely to extend further than the US governmental procurement process.</p>
]]></content:encoded>
      <enclosure length="13042570" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6c1f81d7-80a3-470d-8e52-1aca796cc7d4/audio/075a0dcf-056b-4f4b-bc52-86e608997724/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 138: IoT Cybersecurity Improvement Act of 2020</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6c1f81d7-80a3-470d-8e52-1aca796cc7d4/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:34</itunes:duration>
      <itunes:summary>A new US law called the IoT Cybersecurity Improvement Act of 2020 creates security requirements for IoT devices sold into the US government. Join us as we explain these new requirements and why this law&apos;s reach is likely to extend further than the US governmental procurement process.</itunes:summary>
      <itunes:subtitle>A new US law called the IoT Cybersecurity Improvement Act of 2020 creates security requirements for IoT devices sold into the US government. Join us as we explain these new requirements and why this law&apos;s reach is likely to extend further than the US governmental procurement process.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/951929677</guid>
      <title>Root Causes 137: SolarWinds Supply Chain Attack and Digital Identity</title>
      <description><![CDATA[<p>The SolarWinds Orion supply chain attack is making headlines throughout the tech press. This sophisticated attack includes some unusual manipulations of digital identity and certificates. In this episode we explain how certificates, keys, and identity play into the SolarWinds exploit.</p>
]]></description>
      <pubDate>Mon, 21 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The SolarWinds Orion supply chain attack is making headlines throughout the tech press. This sophisticated attack includes some unusual manipulations of digital identity and certificates. In this episode we explain how certificates, keys, and identity play into the SolarWinds exploit.</p>
]]></content:encoded>
      <enclosure length="29623582" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/724c49d2-dc98-47b8-bfae-ecde802e0181/audio/0c669660-3b9a-4f9c-9e39-018edefef330/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 137: SolarWinds Supply Chain Attack and Digital Identity</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/724c49d2-dc98-47b8-bfae-ecde802e0181/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:50</itunes:duration>
      <itunes:summary>The SolarWinds Orion supply chain attack is making headlines throughout the tech press. This sophisticated attack includes some unusual manipulations of digital identity and certificates. In this episode we explain how certificates, keys, and identity play into the SolarWinds exploit.</itunes:summary>
      <itunes:subtitle>The SolarWinds Orion supply chain attack is making headlines throughout the tech press. This sophisticated attack includes some unusual manipulations of digital identity and certificates. In this episode we explain how certificates, keys, and identity play into the SolarWinds exploit.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/949649428</guid>
      <title>Root Causes 136: 2020 Lookback - Quantum Safe Certificates</title>
      <description><![CDATA[<p>In the third of our year-end lookback episodes, we discuss 2020's progress in the quest for quantum-safe encryption. This includes narrowing the NIST candidate list down to fifteen algorithms, the availability of test hybrid certificates, and the trouble with long-lived IoT devices. Our hosts predict what 2021 will look like for quantum-safe certificates.</p>
]]></description>
      <pubDate>Thu, 17 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In the third of our year-end lookback episodes, we discuss 2020's progress in the quest for quantum-safe encryption. This includes narrowing the NIST candidate list down to fifteen algorithms, the availability of test hybrid certificates, and the trouble with long-lived IoT devices. Our hosts predict what 2021 will look like for quantum-safe certificates.</p>
]]></content:encoded>
      <enclosure length="13852165" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/191f861c-613b-400b-a7ae-4db0355316af/audio/fee82ba4-c269-41a0-9b12-1f9b4d840fe2/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 136: 2020 Lookback - Quantum Safe Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/191f861c-613b-400b-a7ae-4db0355316af/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:25</itunes:duration>
      <itunes:summary>In the third of our year-end lookback episodes, we discuss 2020&apos;s progress in the quest for quantum-safe encryption. This includes narrowing the NIST candidate list down to fifteen algorithms, the availability of test hybrid certificates, and the trouble with long-lived IoT devices. Our hosts predict what 2021 will look like for quantum-safe certificates.</itunes:summary>
      <itunes:subtitle>In the third of our year-end lookback episodes, we discuss 2020&apos;s progress in the quest for quantum-safe encryption. This includes narrowing the NIST candidate list down to fifteen algorithms, the availability of test hybrid certificates, and the trouble with long-lived IoT devices. Our hosts predict what 2021 will look like for quantum-safe certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/947491852</guid>
      <title>Root Causes 135: The Heartbleed Vulnerability</title>
      <description><![CDATA[<p>In April 2014 a software vulnerability called Heartbleed was discovered in OpenSSL. Heartbleed made it possible for attackers to send commands to web servers and steal their private keys. Certificate subscribers around the world had to scramble to patch their servers and replace certificates by the millions. Guest Nick France joins us to explain this vulnerability, its consequences, and whether or not a Heartbleed-like vulnerability could occur today.</p>
]]></description>
      <pubDate>Mon, 14 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In April 2014 a software vulnerability called Heartbleed was discovered in OpenSSL. Heartbleed made it possible for attackers to send commands to web servers and steal their private keys. Certificate subscribers around the world had to scramble to patch their servers and replace certificates by the millions. Guest Nick France joins us to explain this vulnerability, its consequences, and whether or not a Heartbleed-like vulnerability could occur today.</p>
]]></content:encoded>
      <enclosure length="23818064" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d9e1ed12-7d53-462d-93b1-cdca648353a7/audio/bf26b0e1-52de-4b8d-8d36-d210929d22fa/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 135: The Heartbleed Vulnerability</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d9e1ed12-7d53-462d-93b1-cdca648353a7/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:48</itunes:duration>
      <itunes:summary>In April 2014 a software vulnerability called Heartbleed was discovered in OpenSSL. Heartbleed made it possible for attackers to send commands to web servers and steal their private keys. Certificate subscribers around the world had to scramble to patch their servers and replace certificates by the millions. Guest Nick France joins us to explain this vulnerability, its consequences, and whether or not a Heartbleed-like vulnerability could occur today.</itunes:summary>
      <itunes:subtitle>In April 2014 a software vulnerability called Heartbleed was discovered in OpenSSL. Heartbleed made it possible for attackers to send commands to web servers and steal their private keys. Certificate subscribers around the world had to scramble to patch their servers and replace certificates by the millions. Guest Nick France joins us to explain this vulnerability, its consequences, and whether or not a Heartbleed-like vulnerability could occur today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/945256462</guid>
      <title>Root Causes 134: 2020 Lookback - SASE and Zero Trust Architecture</title>
      <description><![CDATA[<p>2020 was a big year for SASE (Secure Access Service Edge).  Our hosts define SASE, ZTNA (Zero Trust Network Architecture), and SDP (Software Defined Perimeter). Our hosts discuss how these technology principles gained momentum in 2020 and why they are poised for continued growth in 2021.</p>
]]></description>
      <pubDate>Wed, 9 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>2020 was a big year for SASE (Secure Access Service Edge).  Our hosts define SASE, ZTNA (Zero Trust Network Architecture), and SDP (Software Defined Perimeter). Our hosts discuss how these technology principles gained momentum in 2020 and why they are poised for continued growth in 2021.</p>
]]></content:encoded>
      <enclosure length="22983750" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d086861f-1d14-4376-b14c-34be7fb43b8c/audio/bbb13e6a-1bdb-4b55-90e0-01f0a46751bb/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 134: 2020 Lookback - SASE and Zero Trust Architecture</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d086861f-1d14-4376-b14c-34be7fb43b8c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:56</itunes:duration>
      <itunes:summary>2020 was a big year for SASE (Secure Access Service Edge).  Our hosts define SASE, ZTNA (Zero Trust Network Architecture), and SDP (Software Defined Perimeter). Our hosts discuss how these technology principles gained momentum in 2020 and why they are poised for continued growth in 2021.</itunes:summary>
      <itunes:subtitle>2020 was a big year for SASE (Secure Access Service Edge).  Our hosts define SASE, ZTNA (Zero Trust Network Architecture), and SDP (Software Defined Perimeter). Our hosts discuss how these technology principles gained momentum in 2020 and why they are poised for continued growth in 2021.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/943163878</guid>
      <title>Root Causes 133: 2020 Lookback - COVID-19</title>
      <description><![CDATA[<p>In 2020 the COVID-19 pandemic changed the way we work. IT departments had to gear up for near-ubiquitous work-from-home (WFH) requirements while maintaining productivity and security. Our hosts talk about the pandemic's affect on employee authentication and access, Zero Trust, IT enablement of retail, immunity passports, and more.</p>
]]></description>
      <pubDate>Mon, 7 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In 2020 the COVID-19 pandemic changed the way we work. IT departments had to gear up for near-ubiquitous work-from-home (WFH) requirements while maintaining productivity and security. Our hosts talk about the pandemic's affect on employee authentication and access, Zero Trust, IT enablement of retail, immunity passports, and more.</p>
]]></content:encoded>
      <enclosure length="23385512" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/bc03ecf1-6b5e-42b1-a125-0a7a904cc052/audio/35b6d74f-d093-47e1-aa48-8c845395e75f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 133: 2020 Lookback - COVID-19</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/bc03ecf1-6b5e-42b1-a125-0a7a904cc052/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:21</itunes:duration>
      <itunes:summary>In 2020 the COVID-19 pandemic changed the way we work. IT departments had to gear up for near-ubiquitous work-from-home (WFH) requirements while maintaining productivity and security. Our hosts talk about the pandemic&apos;s affect on employee authentication and access, Zero Trust, IT enablement of retail, immunity passports, and more.</itunes:summary>
      <itunes:subtitle>In 2020 the COVID-19 pandemic changed the way we work. IT departments had to gear up for near-ubiquitous work-from-home (WFH) requirements while maintaining productivity and security. Our hosts talk about the pandemic&apos;s affect on employee authentication and access, Zero Trust, IT enablement of retail, immunity passports, and more.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/941507815</guid>
      <title>Root Causes 132: Examining MFA Through Soft Tokens</title>
      <description><![CDATA[<p>In our ongoing examination of MFA, our hosts examine authentication through soft-token OTP (one-time passcode). They go over the potential benefits and pitfalls of soft tokens, and compare them to SMS tokens and hard tokens.</p>
]]></description>
      <pubDate>Fri, 4 Dec 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>In our ongoing examination of MFA, our hosts examine authentication through soft-token OTP (one-time passcode). They go over the potential benefits and pitfalls of soft tokens, and compare them to SMS tokens and hard tokens.</p>
]]></content:encoded>
      <enclosure length="16122518" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/c42ed8e7-929f-4231-9fb3-a843e20598f5/audio/9b861152-40ad-4e17-a6c6-6c231a343210/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 132: Examining MFA Through Soft Tokens</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/c42ed8e7-929f-4231-9fb3-a843e20598f5/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:47</itunes:duration>
      <itunes:summary>In our ongoing examination of MFA, our hosts examine authentication through soft-token OTP (one-time passcode). They go over the potential benefits and pitfalls of soft tokens, and compare them to SMS tokens and hard tokens.</itunes:summary>
      <itunes:subtitle>In our ongoing examination of MFA, our hosts examine authentication through soft-token OTP (one-time passcode). They go over the potential benefits and pitfalls of soft tokens, and compare them to SMS tokens and hard tokens.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/938775823</guid>
      <title>Root Causes 131: Apple OCSP Slowdown Explained</title>
      <description><![CDATA[<p>The recent release of Apple's Big Sur OS appears to have driven a temporary slowdown in the company's OCSP responders, affecting code updates across all Apple operating systems.  Guest Nick France joins us to explain what appears to have happened and why.</p>
]]></description>
      <pubDate>Sun, 29 Nov 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recent release of Apple's Big Sur OS appears to have driven a temporary slowdown in the company's OCSP responders, affecting code updates across all Apple operating systems.  Guest Nick France joins us to explain what appears to have happened and why.</p>
]]></content:encoded>
      <enclosure length="16624502" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/49b08ca6-939d-472f-acf2-e86298f3619c/audio/2c2a0743-88db-4c71-ae21-8bcb66dd94d8/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 131: Apple OCSP Slowdown Explained</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/49b08ca6-939d-472f-acf2-e86298f3619c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:18</itunes:duration>
      <itunes:summary>The recent release of Apple&apos;s Big Sur OS appears to have driven a temporary slowdown in the company&apos;s OCSP responders, affecting code updates across all Apple operating systems.  Guest Nick France joins us to explain what appears to have happened and why.</itunes:summary>
      <itunes:subtitle>The recent release of Apple&apos;s Big Sur OS appears to have driven a temporary slowdown in the company&apos;s OCSP responders, affecting code updates across all Apple operating systems.  Guest Nick France joins us to explain what appears to have happened and why.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/935180389</guid>
      <title>Root Causes 130: How to Get Rid of Password Breaches</title>
      <description><![CDATA[<p>Massive password breeches have been so repeatedly prevalent for so many years that as an industry and a society we've just started to accept them as a fact of life. In this episode we discuss the weaknesses of passwords as a strategy and why they nonetheless are so common even today. We describe the roadmap for eventually weeding out passwords from most systems.</p>
]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Massive password breeches have been so repeatedly prevalent for so many years that as an industry and a society we've just started to accept them as a fact of life. In this episode we discuss the weaknesses of passwords as a strategy and why they nonetheless are so common even today. We describe the roadmap for eventually weeding out passwords from most systems.</p>
]]></content:encoded>
      <enclosure length="15352300" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/4d8cf9e7-e8cb-435d-9aec-1e79d75749ce/audio/a8cfc799-70fe-48c6-b2f0-4c5cccf26e56/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 130: How to Get Rid of Password Breaches</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/4d8cf9e7-e8cb-435d-9aec-1e79d75749ce/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:59</itunes:duration>
      <itunes:summary>Massive password breeches have been so repeatedly prevalent for so many years that as an industry and a society we&apos;ve just started to accept them as a fact of life. In this episode we discuss the weaknesses of passwords as a strategy and why they nonetheless are so common even today. We describe the roadmap for eventually weeding out passwords from most systems.</itunes:summary>
      <itunes:subtitle>Massive password breeches have been so repeatedly prevalent for so many years that as an industry and a society we&apos;ve just started to accept them as a fact of life. In this episode we discuss the weaknesses of passwords as a strategy and why they nonetheless are so common even today. We describe the roadmap for eventually weeding out passwords from most systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/932271430</guid>
      <title>Root Causes 129: Examining MFA Through Hard Tokens</title>
      <description><![CDATA[<p>Hard tokens are one of the oldest multi-factor authentication (MFA) form factors there is, and still in use today. In the latest in our series of explorations of MFA strategies, we examine the strengths and weaknesses of hard tokens as an MFA strategy.</p>
]]></description>
      <pubDate>Thu, 19 Nov 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Hard tokens are one of the oldest multi-factor authentication (MFA) form factors there is, and still in use today. In the latest in our series of explorations of MFA strategies, we examine the strengths and weaknesses of hard tokens as an MFA strategy.</p>
]]></content:encoded>
      <enclosure length="14654641" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/267da8c3-aaa1-4f5d-bf33-97f1988c8133/audio/8804fdbb-5918-44e4-af34-858c0c7aad04/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 129: Examining MFA Through Hard Tokens</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/267da8c3-aaa1-4f5d-bf33-97f1988c8133/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:15</itunes:duration>
      <itunes:summary>Hard tokens are one of the oldest multi-factor authentication (MFA) form factors there is, and still in use today. In the latest in our series of explorations of MFA strategies, we examine the strengths and weaknesses of hard tokens as an MFA strategy.</itunes:summary>
      <itunes:subtitle>Hard tokens are one of the oldest multi-factor authentication (MFA) form factors there is, and still in use today. In the latest in our series of explorations of MFA strategies, we examine the strengths and weaknesses of hard tokens as an MFA strategy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/928153687</guid>
      <title>Root Causes 128: What Is Total Certificate Agility?</title>
      <description><![CDATA[<p>First we had crypto agility, which is how we ensure our cryptography stays current with the needs of security. Expanding on this concept, industry leaders are now looking at certificate agility, which is building our systems so that all certificates are known, current, and immediately replaceable.  Our hosts explain certificate agility, why it's important, and what you need to do to achieve it.</p>
]]></description>
      <pubDate>Thu, 12 Nov 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>First we had crypto agility, which is how we ensure our cryptography stays current with the needs of security. Expanding on this concept, industry leaders are now looking at certificate agility, which is building our systems so that all certificates are known, current, and immediately replaceable.  Our hosts explain certificate agility, why it's important, and what you need to do to achieve it.</p>
]]></content:encoded>
      <enclosure length="14312348" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/da60423b-56b8-4bc2-83d7-0ebb894f3f45/audio/b294fc14-e6a6-4a8e-bc89-3ce41352af9e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 128: What Is Total Certificate Agility?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/da60423b-56b8-4bc2-83d7-0ebb894f3f45/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:54</itunes:duration>
      <itunes:summary>First we had crypto agility, which is how we ensure our cryptography stays current with the needs of security. Expanding on this concept, industry leaders are now looking at certificate agility, which is building our systems so that all certificates are known, current, and immediately replaceable.  Our hosts explain certificate agility, why it&apos;s important, and what you need to do to achieve it.</itunes:summary>
      <itunes:subtitle>First we had crypto agility, which is how we ensure our cryptography stays current with the needs of security. Expanding on this concept, industry leaders are now looking at certificate agility, which is building our systems so that all certificates are known, current, and immediately replaceable.  Our hosts explain certificate agility, why it&apos;s important, and what you need to do to achieve it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/923830939</guid>
      <title>Root Causes 127: What Does a Chief Compliance Officer Do at a Public CA Do?</title>
      <description><![CDATA[<p>Our co-host Tim Callan has changed his title to Chief Compliance Officer. Join him and co-host Jason Soroko as they discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.</p>
]]></description>
      <pubDate>Wed, 4 Nov 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our co-host Tim Callan has changed his title to Chief Compliance Officer. Join him and co-host Jason Soroko as they discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.</p>
]]></content:encoded>
      <enclosure length="13582969" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e3c1d4ad-69cf-4e7f-b973-9ed58958c7e8/audio/94417698-0935-423a-a94e-9d5bf7d8c50b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 127: What Does a Chief Compliance Officer Do at a Public CA Do?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e3c1d4ad-69cf-4e7f-b973-9ed58958c7e8/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:08</itunes:duration>
      <itunes:summary>Our co-host Tim Callan has changed his title to Chief Compliance Officer. Join him and co-host Jason Soroko as they discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.</itunes:summary>
      <itunes:subtitle>Our co-host Tim Callan has changed his title to Chief Compliance Officer. Join him and co-host Jason Soroko as they discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/920356030</guid>
      <title>Root Causes 126:  IoT Ransomware</title>
      <description><![CDATA[<p>New research shows how ransomware attacks could be launched against IoT devices. Our hosts are joined by Alan Grau to understand these attacks and what can be done to defend against them, including technical controls such as strong identity and embedded firewalls.</p>
]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>New research shows how ransomware attacks could be launched against IoT devices. Our hosts are joined by Alan Grau to understand these attacks and what can be done to defend against them, including technical controls such as strong identity and embedded firewalls.</p>
]]></content:encoded>
      <enclosure length="17313283" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/904da9d0-d081-44d5-9af9-537bd04172e6/audio/35d9eefe-98db-4ee6-abec-99fc5c5f4055/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 126:  IoT Ransomware</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/904da9d0-d081-44d5-9af9-537bd04172e6/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:01</itunes:duration>
      <itunes:summary>New research shows how ransomware attacks could be launched against IoT devices. Our hosts are joined by Alan Grau to understand these attacks and what can be done to defend against them, including technical controls such as strong identity and embedded firewalls.</itunes:summary>
      <itunes:subtitle>New research shows how ransomware attacks could be launched against IoT devices. Our hosts are joined by Alan Grau to understand these attacks and what can be done to defend against them, including technical controls such as strong identity and embedded firewalls.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/907349248</guid>
      <title>Root Causes 125: Digital Identity Versus IAM</title>
      <description><![CDATA[<p>Digital certificates and PKI provide digital identity and access.  Identity and Access Management (IAM) is a huge technology category featuring major players like Okta, DUO, and Ping Identity. And despite the fact that they feature a lot of the same words in their descriptions, these two categories are entirely different spaces that do entirely different things. In this episode we explain the difference between digital identity certificates and IAM platforms and how they fit in together.</p>
]]></description>
      <pubDate>Thu, 8 Oct 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Digital certificates and PKI provide digital identity and access.  Identity and Access Management (IAM) is a huge technology category featuring major players like Okta, DUO, and Ping Identity. And despite the fact that they feature a lot of the same words in their descriptions, these two categories are entirely different spaces that do entirely different things. In this episode we explain the difference between digital identity certificates and IAM platforms and how they fit in together.</p>
]]></content:encoded>
      <enclosure length="10689087" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9aea0444-8860-430d-b597-623ee8a743c6/audio/2b551a47-b8ba-42ac-a0eb-6c96768de6f7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 125: Digital Identity Versus IAM</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9aea0444-8860-430d-b597-623ee8a743c6/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:07</itunes:duration>
      <itunes:summary>Digital certificates and PKI provide digital identity and access.  Identity and Access Management (IAM) is a huge technology category featuring major players like Okta, DUO, and Ping Identity. And despite the fact that they feature a lot of the same words in their descriptions, these two categories are entirely different spaces that do entirely different things. In this episode we explain the difference between digital identity certificates and IAM platforms and how they fit in together.</itunes:summary>
      <itunes:subtitle>Digital certificates and PKI provide digital identity and access.  Identity and Access Management (IAM) is a huge technology category featuring major players like Okta, DUO, and Ping Identity. And despite the fact that they feature a lot of the same words in their descriptions, these two categories are entirely different spaces that do entirely different things. In this episode we explain the difference between digital identity certificates and IAM platforms and how they fit in together.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/905126848</guid>
      <title>Root Causes 124: Biometric MFA</title>
      <description><![CDATA[<p>As part of our ongoing series on the pros and cons of various forms of multi-factor authentication (MFA) in this episode we explore biometrics. Our hosts discuss their strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.</p>
]]></description>
      <pubDate>Mon, 5 Oct 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As part of our ongoing series on the pros and cons of various forms of multi-factor authentication (MFA) in this episode we explore biometrics. Our hosts discuss their strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.</p>
]]></content:encoded>
      <enclosure length="10009860" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a1edf021-66d9-4505-b0b8-079e019df685/audio/7bb954ee-ddb8-4b22-aa50-4e1292e5b62e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 124: Biometric MFA</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a1edf021-66d9-4505-b0b8-079e019df685/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:25</itunes:duration>
      <itunes:summary>As part of our ongoing series on the pros and cons of various forms of multi-factor authentication (MFA) in this episode we explore biometrics. Our hosts discuss their strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.</itunes:summary>
      <itunes:subtitle>As part of our ongoing series on the pros and cons of various forms of multi-factor authentication (MFA) in this episode we explore biometrics. Our hosts discuss their strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/903014983</guid>
      <title>Root Causes 123: Asymmetric Versus Symmetric Encryption</title>
      <description><![CDATA[<p>One of the cornerstones of the success of PKI and digital certificates is their dependence on an asymmetric encryption model. In this episode our hosts explain the difference between asymmetric and symmetric secrets and how they fit into encryption.</p>
]]></description>
      <pubDate>Thu, 1 Oct 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One of the cornerstones of the success of PKI and digital certificates is their dependence on an asymmetric encryption model. In this episode our hosts explain the difference between asymmetric and symmetric secrets and how they fit into encryption.</p>
]]></content:encoded>
      <enclosure length="21046934" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/baec5ad8-4630-4a60-9c61-02afc8326065/audio/c482ab06-175a-4a3d-bfd4-815f6761b48b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 123: Asymmetric Versus Symmetric Encryption</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/baec5ad8-4630-4a60-9c61-02afc8326065/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:55</itunes:duration>
      <itunes:summary>One of the cornerstones of the success of PKI and digital certificates is their dependence on an asymmetric encryption model. In this episode our hosts explain the difference between asymmetric and symmetric secrets and how they fit into encryption.</itunes:summary>
      <itunes:subtitle>One of the cornerstones of the success of PKI and digital certificates is their dependence on an asymmetric encryption model. In this episode our hosts explain the difference between asymmetric and symmetric secrets and how they fit into encryption.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/901181041</guid>
      <title>Root Causes 122: Passwordless Authentication for Apple OS</title>
      <description><![CDATA[<p>Our hosts are joined by Joel Rennich of Jamf to talk about passwordless authentication and access for various Apple platforms. Joel explains the variety of user experiences that can qualify as passwordless access, with an eye to the specific needs and opportunities for Apple devices.</p>
]]></description>
      <pubDate>Mon, 28 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our hosts are joined by Joel Rennich of Jamf to talk about passwordless authentication and access for various Apple platforms. Joel explains the variety of user experiences that can qualify as passwordless access, with an eye to the specific needs and opportunities for Apple devices.</p>
]]></content:encoded>
      <enclosure length="31595011" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/479b2411-e386-448a-9927-0c67e2c2aa92/audio/df4e502d-982c-4af0-84c9-17ee21336bc0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 122: Passwordless Authentication for Apple OS</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/479b2411-e386-448a-9927-0c67e2c2aa92/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:54</itunes:duration>
      <itunes:summary>Our hosts are joined by Joel Rennich of Jamf to talk about passwordless authentication and access for various Apple platforms. Joel explains the variety of user experiences that can qualify as passwordless access, with an eye to the specific needs and opportunities for Apple devices.</itunes:summary>
      <itunes:subtitle>Our hosts are joined by Joel Rennich of Jamf to talk about passwordless authentication and access for various Apple platforms. Joel explains the variety of user experiences that can qualify as passwordless access, with an eye to the specific needs and opportunities for Apple devices.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/897102085</guid>
      <title>Root Causes 121 : What Is a Hardware Security Module?</title>
      <description><![CDATA[<p>A Hardware Security Module, or HSM, is a piece of hardware that securely stores secret material such as cryptographic keys. Join our hosts as they explain terms like HSM, Trusted Platform Module (TPM),  Secure Enclave, TrustZone, and Hardware Secure Element (SE).</p>
]]></description>
      <pubDate>Mon, 21 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A Hardware Security Module, or HSM, is a piece of hardware that securely stores secret material such as cryptographic keys. Join our hosts as they explain terms like HSM, Trusted Platform Module (TPM),  Secure Enclave, TrustZone, and Hardware Secure Element (SE).</p>
]]></content:encoded>
      <enclosure length="14362064" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/08d563d0-3774-4bdb-a43b-adcaee6a19fc/audio/23296c76-9b7f-4a3d-8b35-b511982d32fd/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 121 : What Is a Hardware Security Module?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/08d563d0-3774-4bdb-a43b-adcaee6a19fc/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:57</itunes:duration>
      <itunes:summary>A Hardware Security Module, or HSM, is a piece of hardware that securely stores secret material such as cryptographic keys. Join our hosts as they explain terms like HSM, Trusted Platform Module (TPM),  Secure Enclave, TrustZone, and Hardware Secure Element (SE).</itunes:summary>
      <itunes:subtitle>A Hardware Security Module, or HSM, is a piece of hardware that securely stores secret material such as cryptographic keys. Join our hosts as they explain terms like HSM, Trusted Platform Module (TPM),  Secure Enclave, TrustZone, and Hardware Secure Element (SE).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/895595008</guid>
      <title>Root Causes 120: PKI and SASE</title>
      <description><![CDATA[<p>SASE (Secure Access Service Edge) is a new term to describe the complexity of authenticating access across today's diverse and heterogeneous computing environments. Join our hosts as they discuss the role of digital identity and certificates in this paradigm.</p>
]]></description>
      <pubDate>Fri, 18 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>SASE (Secure Access Service Edge) is a new term to describe the complexity of authenticating access across today's diverse and heterogeneous computing environments. Join our hosts as they discuss the role of digital identity and certificates in this paradigm.</p>
]]></content:encoded>
      <enclosure length="18778710" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/b1078338-856e-4749-8712-beeffa1b1fd9/audio/768a9041-6ee1-4cc9-8972-26b71e5881e1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 120: PKI and SASE</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/b1078338-856e-4749-8712-beeffa1b1fd9/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:33</itunes:duration>
      <itunes:summary>SASE (Secure Access Service Edge) is a new term to describe the complexity of authenticating access across today&apos;s diverse and heterogeneous computing environments. Join our hosts as they discuss the role of digital identity and certificates in this paradigm.</itunes:summary>
      <itunes:subtitle>SASE (Secure Access Service Edge) is a new term to describe the complexity of authenticating access across today&apos;s diverse and heterogeneous computing environments. Join our hosts as they discuss the role of digital identity and certificates in this paradigm.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/893212267</guid>
      <title>Root Causes 119: What Is Crypto Agility?</title>
      <description><![CDATA[<p>Security industry insiders sometimes use the phrase &quot;crypto agility.&quot; In this episode our hosts define crypto agility - or cryptographic agility. They explain why crypto agility is more important than ever, why the pace of cryptographic change is going up, and what certificate subscribers can do to improve their crypto agility.</p>
]]></description>
      <pubDate>Mon, 14 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Security industry insiders sometimes use the phrase &quot;crypto agility.&quot; In this episode our hosts define crypto agility - or cryptographic agility. They explain why crypto agility is more important than ever, why the pace of cryptographic change is going up, and what certificate subscribers can do to improve their crypto agility.</p>
]]></content:encoded>
      <enclosure length="17563641" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/f6454065-5c7f-4427-8c77-8c72a8fdc68e/audio/f4880bc1-2618-4018-885f-f7e6cdc6931a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 119: What Is Crypto Agility?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/f6454065-5c7f-4427-8c77-8c72a8fdc68e/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:17</itunes:duration>
      <itunes:summary>Security industry insiders sometimes use the phrase &quot;crypto agility.&quot; In this episode our hosts define crypto agility - or cryptographic agility. They explain why crypto agility is more important than ever, why the pace of cryptographic change is going up, and what certificate subscribers can do to improve their crypto agility.</itunes:summary>
      <itunes:subtitle>Security industry insiders sometimes use the phrase &quot;crypto agility.&quot; In this episode our hosts define crypto agility - or cryptographic agility. They explain why crypto agility is more important than ever, why the pace of cryptographic change is going up, and what certificate subscribers can do to improve their crypto agility.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/889933690</guid>
      <title>Root Causes 118: Quantum Apocalypse - What Is a Hybrid Certificate?</title>
      <description><![CDATA[<p>As part of its quantum safe initiative, Sectigo is now offering its Quantum Safe Kit, which enables the creation of hybrid TLS certificates.  In this episode our hosts are joined by guest Alan Grau to explain what hybrid certificates are, how they are essential to transitioning to quantum-safe crypto, and the ways enterprises can begin using them today.</p>
]]></description>
      <pubDate>Mon, 7 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As part of its quantum safe initiative, Sectigo is now offering its Quantum Safe Kit, which enables the creation of hybrid TLS certificates.  In this episode our hosts are joined by guest Alan Grau to explain what hybrid certificates are, how they are essential to transitioning to quantum-safe crypto, and the ways enterprises can begin using them today.</p>
]]></content:encoded>
      <enclosure length="22848322" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/294bad55-7e47-4a8f-b866-39e20d9c699d/audio/854eabd2-a6fe-4854-9a39-d906821602ac/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 118: Quantum Apocalypse - What Is a Hybrid Certificate?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/294bad55-7e47-4a8f-b866-39e20d9c699d/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:47</itunes:duration>
      <itunes:summary>As part of its quantum safe initiative, Sectigo is now offering its Quantum Safe Kit, which enables the creation of hybrid TLS certificates.  In this episode our hosts are joined by guest Alan Grau to explain what hybrid certificates are, how they are essential to transitioning to quantum-safe crypto, and the ways enterprises can begin using them today.</itunes:summary>
      <itunes:subtitle>As part of its quantum safe initiative, Sectigo is now offering its Quantum Safe Kit, which enables the creation of hybrid TLS certificates.  In this episode our hosts are joined by guest Alan Grau to explain what hybrid certificates are, how they are essential to transitioning to quantum-safe crypto, and the ways enterprises can begin using them today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/887750884</guid>
      <title>Root Causes 117: Why Default Deny Matters to the CA/Browser Forum</title>
      <description><![CDATA[<p>This year the CA/Browser Forum has put considerable discussion into the concept of &quot;default deny.&quot; It's a philosophy for how to interpret potential ambiguities in existing guidelines for public certificates, and how you land on the default-deny question can have a significant impact on how you interpret the rules. Join our hosts as they describe this debate and its potential impact on public certificates.</p>
]]></description>
      <pubDate>Fri, 4 Sep 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>This year the CA/Browser Forum has put considerable discussion into the concept of &quot;default deny.&quot; It's a philosophy for how to interpret potential ambiguities in existing guidelines for public certificates, and how you land on the default-deny question can have a significant impact on how you interpret the rules. Join our hosts as they describe this debate and its potential impact on public certificates.</p>
]]></content:encoded>
      <enclosure length="18281693" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/328243a1-3d36-471a-99e6-991d87cf248f/audio/ce40e755-3e96-42ba-9500-632002fed939/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 117: Why Default Deny Matters to the CA/Browser Forum</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/328243a1-3d36-471a-99e6-991d87cf248f/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:02</itunes:duration>
      <itunes:summary>This year the CA/Browser Forum has put considerable discussion into the concept of &quot;default deny.&quot; It&apos;s a philosophy for how to interpret potential ambiguities in existing guidelines for public certificates, and how you land on the default-deny question can have a significant impact on how you interpret the rules. Join our hosts as they describe this debate and its potential impact on public certificates.</itunes:summary>
      <itunes:subtitle>This year the CA/Browser Forum has put considerable discussion into the concept of &quot;default deny.&quot; It&apos;s a philosophy for how to interpret potential ambiguities in existing guidelines for public certificates, and how you land on the default-deny question can have a significant impact on how you interpret the rules. Join our hosts as they describe this debate and its potential impact on public certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/885063469</guid>
      <title>Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT</title>
      <description><![CDATA[<p>Ripple20 is a recently announced set of documented vulnerabilities in the early Treck TCP/IP stack, a popular choice for early IoT devices. Our hosts are joined by guest Alan Grau, who explains the significance of these vulnerabilities, the difficulties in dealing with them, and how we can improve to avoid these problems in the future.</p>
]]></description>
      <pubDate>Sun, 30 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Ripple20 is a recently announced set of documented vulnerabilities in the early Treck TCP/IP stack, a popular choice for early IoT devices. Our hosts are joined by guest Alan Grau, who explains the significance of these vulnerabilities, the difficulties in dealing with them, and how we can improve to avoid these problems in the future.</p>
]]></content:encoded>
      <enclosure length="13724680" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a4222ca8-692e-4642-9cd5-d93bdeb28c66/audio/ef7ad95c-713a-441c-aa03-59dc263328de/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a4222ca8-692e-4642-9cd5-d93bdeb28c66/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:17</itunes:duration>
      <itunes:summary>Ripple20 is a recently announced set of documented vulnerabilities in the early Treck TCP/IP stack, a popular choice for early IoT devices. Our hosts are joined by guest Alan Grau, who explains the significance of these vulnerabilities, the difficulties in dealing with them, and how we can improve to avoid these problems in the future.</itunes:summary>
      <itunes:subtitle>Ripple20 is a recently announced set of documented vulnerabilities in the early Treck TCP/IP stack, a popular choice for early IoT devices. Our hosts are joined by guest Alan Grau, who explains the significance of these vulnerabilities, the difficulties in dealing with them, and how we can improve to avoid these problems in the future.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/882981625</guid>
      <title>Root Causes 115: Signed HTTP Exchange (SXG) Certificates</title>
      <description><![CDATA[<p>Accelerated Mobile Pages, or AMP, is a Google standard for packaging web content for consistent and usable display on mobile devices. SXG certificates enable the display of the original publisher's authenticated URL in the mobile reader. Join us as we explain the potential benefits of SXG to readers and content publishers.</p>
]]></description>
      <pubDate>Thu, 27 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Accelerated Mobile Pages, or AMP, is a Google standard for packaging web content for consistent and usable display on mobile devices. SXG certificates enable the display of the original publisher's authenticated URL in the mobile reader. Join us as we explain the potential benefits of SXG to readers and content publishers.</p>
]]></content:encoded>
      <enclosure length="10806084" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ba4d91c8-f6d5-4c18-94a6-3438d864b61c/audio/1932b06f-ca68-45f9-97a2-3dee8c1a37e6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 115: Signed HTTP Exchange (SXG) Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ba4d91c8-f6d5-4c18-94a6-3438d864b61c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:14</itunes:duration>
      <itunes:summary>Accelerated Mobile Pages, or AMP, is a Google standard for packaging web content for consistent and usable display on mobile devices. SXG certificates enable the display of the original publisher&apos;s authenticated URL in the mobile reader. Join us as we explain the potential benefits of SXG to readers and content publishers.</itunes:summary>
      <itunes:subtitle>Accelerated Mobile Pages, or AMP, is a Google standard for packaging web content for consistent and usable display on mobile devices. SXG certificates enable the display of the original publisher&apos;s authenticated URL in the mobile reader. Join us as we explain the potential benefits of SXG to readers and content publishers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/879760075</guid>
      <title>Root Causes 114: Is Quantum Computing a Threat to SHA-2?</title>
      <description><![CDATA[<p>Quantum computers' threat to standardized encryption algorithms RSA and ECC has been much discussed. But what about our hashing algorithms? Do quantum computers pose a similar threat to SHA-2? Join our hosts as they discuss the difference between Shor's Algorithms and Grover's Algorithm, which applies to each part of cryptography, and how significant quantum computing will be for each.</p>
]]></description>
      <pubDate>Fri, 21 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Quantum computers' threat to standardized encryption algorithms RSA and ECC has been much discussed. But what about our hashing algorithms? Do quantum computers pose a similar threat to SHA-2? Join our hosts as they discuss the difference between Shor's Algorithms and Grover's Algorithm, which applies to each part of cryptography, and how significant quantum computing will be for each.</p>
]]></content:encoded>
      <enclosure length="11519618" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/a2c7079b-dcb1-4ad3-b49b-ab1983fe0873/audio/ecae5a07-c3d0-455a-81a9-8699b5323173/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 114: Is Quantum Computing a Threat to SHA-2?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/a2c7079b-dcb1-4ad3-b49b-ab1983fe0873/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:59</itunes:duration>
      <itunes:summary>Quantum computers&apos; threat to standardized encryption algorithms RSA and ECC has been much discussed. But what about our hashing algorithms? Do quantum computers pose a similar threat to SHA-2? Join our hosts as they discuss the difference between Shor&apos;s Algorithms and Grover&apos;s Algorithm, which applies to each part of cryptography, and how significant quantum computing will be for each.</itunes:summary>
      <itunes:subtitle>Quantum computers&apos; threat to standardized encryption algorithms RSA and ECC has been much discussed. But what about our hashing algorithms? Do quantum computers pose a similar threat to SHA-2? Join our hosts as they discuss the difference between Shor&apos;s Algorithms and Grover&apos;s Algorithm, which applies to each part of cryptography, and how significant quantum computing will be for each.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/877906909</guid>
      <title>Root Causes 113: What Is Certificate Pinning?</title>
      <description><![CDATA[<p>Certificate pinning is the practice of coding software to demand the presence of a specific certificate brand or root in order to function correctly. Though once considered a legitimate security option, certificate pinning is widely discredited because it carries unacceptable certificate agility costs. Join our hosts as they explain what certificate pinning is, how it came about, and why nearly all developers should avoid certificate pinning today.</p>
]]></description>
      <pubDate>Tue, 18 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Certificate pinning is the practice of coding software to demand the presence of a specific certificate brand or root in order to function correctly. Though once considered a legitimate security option, certificate pinning is widely discredited because it carries unacceptable certificate agility costs. Join our hosts as they explain what certificate pinning is, how it came about, and why nearly all developers should avoid certificate pinning today.</p>
]]></content:encoded>
      <enclosure length="16683842" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/2dd25c59-4305-454b-a125-c0df33f28d3e/audio/a5a39843-46fb-4028-b1e9-150ee67aecc6/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 113: What Is Certificate Pinning?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/2dd25c59-4305-454b-a125-c0df33f28d3e/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:22</itunes:duration>
      <itunes:summary>Certificate pinning is the practice of coding software to demand the presence of a specific certificate brand or root in order to function correctly. Though once considered a legitimate security option, certificate pinning is widely discredited because it carries unacceptable certificate agility costs. Join our hosts as they explain what certificate pinning is, how it came about, and why nearly all developers should avoid certificate pinning today.</itunes:summary>
      <itunes:subtitle>Certificate pinning is the practice of coding software to demand the presence of a specific certificate brand or root in order to function correctly. Though once considered a legitimate security option, certificate pinning is widely discredited because it carries unacceptable certificate agility costs. Join our hosts as they explain what certificate pinning is, how it came about, and why nearly all developers should avoid certificate pinning today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/875229079</guid>
      <title>Root Causes 112: Introducing Sectigo Quantum Labs</title>
      <description><![CDATA[<p>For more than a year Sectigo has been providing the market with information to understand what we all must do to change our cryptography to prepare for quantum computers. Now Sectigo has announced Sectigo Quantum Labs, a destination for education on quantum-safe certificates (QSC) and our Quantum-Safe Kit, which allows enterprises to create their own hybrid quantum-safe certs. Join us as we articulate what Sectigo Quantum Labs has to offer you.</p>
]]></description>
      <pubDate>Thu, 13 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For more than a year Sectigo has been providing the market with information to understand what we all must do to change our cryptography to prepare for quantum computers. Now Sectigo has announced Sectigo Quantum Labs, a destination for education on quantum-safe certificates (QSC) and our Quantum-Safe Kit, which allows enterprises to create their own hybrid quantum-safe certs. Join us as we articulate what Sectigo Quantum Labs has to offer you.</p>
]]></content:encoded>
      <enclosure length="12735037" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/cac1a0ff-40b9-48ca-976f-c44a39f47221/audio/4264e516-5973-44a2-8d17-303621ced03e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 112: Introducing Sectigo Quantum Labs</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/cac1a0ff-40b9-48ca-976f-c44a39f47221/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:15</itunes:duration>
      <itunes:summary>For more than a year Sectigo has been providing the market with information to understand what we all must do to change our cryptography to prepare for quantum computers. Now Sectigo has announced Sectigo Quantum Labs, a destination for education on quantum-safe certificates (QSC) and our Quantum-Safe Kit, which allows enterprises to create their own hybrid quantum-safe certs. Join us as we articulate what Sectigo Quantum Labs has to offer you.</itunes:summary>
      <itunes:subtitle>For more than a year Sectigo has been providing the market with information to understand what we all must do to change our cryptography to prepare for quantum computers. Now Sectigo has announced Sectigo Quantum Labs, a destination for education on quantum-safe certificates (QSC) and our Quantum-Safe Kit, which allows enterprises to create their own hybrid quantum-safe certs. Join us as we articulate what Sectigo Quantum Labs has to offer you.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/873390712</guid>
      <title>Root Causes 111: Secure Data Interconnects</title>
      <description><![CDATA[<p>Distributed data centers are extremely common in today's computing environments. Unencrypted replication of data across these centers leaves data open to theft. Nonetheless, existing systems and software leave that possibility open, and sometimes data replication occurs in the clear. Our hosts explain how this situation can come about and what to do about it.</p>
]]></description>
      <pubDate>Mon, 10 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Distributed data centers are extremely common in today's computing environments. Unencrypted replication of data across these centers leaves data open to theft. Nonetheless, existing systems and software leave that possibility open, and sometimes data replication occurs in the clear. Our hosts explain how this situation can come about and what to do about it.</p>
]]></content:encoded>
      <enclosure length="12149833" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/3a2d537c-7125-4356-b7a8-2bb9fa5ce2c3/audio/e887cbb0-871e-4bcc-860c-38815ef7f04b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 111: Secure Data Interconnects</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/3a2d537c-7125-4356-b7a8-2bb9fa5ce2c3/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:38</itunes:duration>
      <itunes:summary>Distributed data centers are extremely common in today&apos;s computing environments. Unencrypted replication of data across these centers leaves data open to theft. Nonetheless, existing systems and software leave that possibility open, and sometimes data replication occurs in the clear. Our hosts explain how this situation can come about and what to do about it.</itunes:summary>
      <itunes:subtitle>Distributed data centers are extremely common in today&apos;s computing environments. Unencrypted replication of data across these centers leaves data open to theft. Nonetheless, existing systems and software leave that possibility open, and sometimes data replication occurs in the clear. Our hosts explain how this situation can come about and what to do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/871380253</guid>
      <title>Root Causes 110: Single-domain, Multi-domain, and Wildcard SSL Certificates</title>
      <description><![CDATA[<p>When you obtain an SSL certificate, you can choose between single-domain, multi-domain, and wildcard certificates. Join our hosts as they explain the different domain spaces available with TLS certificates and the pros and cons of each approach.</p>
]]></description>
      <pubDate>Thu, 6 Aug 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>When you obtain an SSL certificate, you can choose between single-domain, multi-domain, and wildcard certificates. Join our hosts as they explain the different domain spaces available with TLS certificates and the pros and cons of each approach.</p>
]]></content:encoded>
      <enclosure length="22158432" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/68fc8c2e-e27a-4b0b-906a-00e24d100c7a/audio/181c8516-e502-441d-89d0-f39188cdafe7/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 110: Single-domain, Multi-domain, and Wildcard SSL Certificates</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/68fc8c2e-e27a-4b0b-906a-00e24d100c7a/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:04</itunes:duration>
      <itunes:summary>When you obtain an SSL certificate, you can choose between single-domain, multi-domain, and wildcard certificates. Join our hosts as they explain the different domain spaces available with TLS certificates and the pros and cons of each approach.</itunes:summary>
      <itunes:subtitle>When you obtain an SSL certificate, you can choose between single-domain, multi-domain, and wildcard certificates. Join our hosts as they explain the different domain spaces available with TLS certificates and the pros and cons of each approach.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/866666893</guid>
      <title>Root Causes 109: Examining MFA Through Phone-based SMS</title>
      <description><![CDATA[<p>SMS-based one time password (OTP) is a very commonly used form of multi-factor authentication (MFA). That's because it's fast and inexpensive to roll out to users. Unfortunately it is deeply vulnerable to a set of well-defined attacks. In this episode our hosts explain why SMS MFA became so popular and how this outdated MFA scheme fails to provide the security expected by those who use it.</p>
]]></description>
      <pubDate>Wed, 29 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>SMS-based one time password (OTP) is a very commonly used form of multi-factor authentication (MFA). That's because it's fast and inexpensive to roll out to users. Unfortunately it is deeply vulnerable to a set of well-defined attacks. In this episode our hosts explain why SMS MFA became so popular and how this outdated MFA scheme fails to provide the security expected by those who use it.</p>
]]></content:encoded>
      <enclosure length="14680241" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/adf318ef-476d-4d42-85da-c0c2f18d8d12/audio/baecd6da-81b2-49ed-9d12-afe865f7c0ef/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 109: Examining MFA Through Phone-based SMS</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/adf318ef-476d-4d42-85da-c0c2f18d8d12/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:17</itunes:duration>
      <itunes:summary>SMS-based one time password (OTP) is a very commonly used form of multi-factor authentication (MFA). That&apos;s because it&apos;s fast and inexpensive to roll out to users. Unfortunately it is deeply vulnerable to a set of well-defined attacks. In this episode our hosts explain why SMS MFA became so popular and how this outdated MFA scheme fails to provide the security expected by those who use it.</itunes:summary>
      <itunes:subtitle>SMS-based one time password (OTP) is a very commonly used form of multi-factor authentication (MFA). That&apos;s because it&apos;s fast and inexpensive to roll out to users. Unfortunately it is deeply vulnerable to a set of well-defined attacks. In this episode our hosts explain why SMS MFA became so popular and how this outdated MFA scheme fails to provide the security expected by those who use it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/863947288</guid>
      <title>Root Causes 108: Why Do Certificates Expire?</title>
      <description><![CDATA[<p>Root expirations occasionally make headlines by breaking systems, but it's a fact that certificates are expiring every day, each a potential outage waiting to happen. So why do certificates expire in the first place? Join our hosts as they discuss the reasons for expiration, its advantages over other mechanisms like revocation, and the right amount of time for a certificate to last.</p>
]]></description>
      <pubDate>Fri, 24 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Root expirations occasionally make headlines by breaking systems, but it's a fact that certificates are expiring every day, each a potential outage waiting to happen. So why do certificates expire in the first place? Join our hosts as they discuss the reasons for expiration, its advantages over other mechanisms like revocation, and the right amount of time for a certificate to last.</p>
]]></content:encoded>
      <enclosure length="18819909" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/089baf71-ff5e-4085-bb40-19bbbc892e94/audio/453f68b0-a32a-40e7-9f80-86f505bee44a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 108: Why Do Certificates Expire?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/089baf71-ff5e-4085-bb40-19bbbc892e94/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:36</itunes:duration>
      <itunes:summary>Root expirations occasionally make headlines by breaking systems, but it&apos;s a fact that certificates are expiring every day, each a potential outage waiting to happen. So why do certificates expire in the first place? Join our hosts as they discuss the reasons for expiration, its advantages over other mechanisms like revocation, and the right amount of time for a certificate to last.</itunes:summary>
      <itunes:subtitle>Root expirations occasionally make headlines by breaking systems, but it&apos;s a fact that certificates are expiring every day, each a potential outage waiting to happen. So why do certificates expire in the first place? Join our hosts as they discuss the reasons for expiration, its advantages over other mechanisms like revocation, and the right amount of time for a certificate to last.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/861273151</guid>
      <title>Root Causes 107: IoT Security Baseline Requirements from ETSI</title>
      <description><![CDATA[<p>ETSI has published its new Baseline Requirements for consumer IoT device security, which includes a number of provisions directly related to encryption, strong identity, and device software integrity. Join our hosts as they describe the PKI-related portions of the new ETSI requirements and why they are valuable for security.</p>
]]></description>
      <pubDate>Mon, 20 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>ETSI has published its new Baseline Requirements for consumer IoT device security, which includes a number of provisions directly related to encryption, strong identity, and device software integrity. Join our hosts as they describe the PKI-related portions of the new ETSI requirements and why they are valuable for security.</p>
]]></content:encoded>
      <enclosure length="20060761" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/066cb0f7-bc54-48a8-b41e-63207d50f72b/audio/d28defd4-411b-4df6-9074-19b5a7347f78/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 107: IoT Security Baseline Requirements from ETSI</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/066cb0f7-bc54-48a8-b41e-63207d50f72b/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:53</itunes:duration>
      <itunes:summary>ETSI has published its new Baseline Requirements for consumer IoT device security, which includes a number of provisions directly related to encryption, strong identity, and device software integrity. Join our hosts as they describe the PKI-related portions of the new ETSI requirements and why they are valuable for security.</itunes:summary>
      <itunes:subtitle>ETSI has published its new Baseline Requirements for consumer IoT device security, which includes a number of provisions directly related to encryption, strong identity, and device software integrity. Join our hosts as they describe the PKI-related portions of the new ETSI requirements and why they are valuable for security.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/857949475</guid>
      <title>Root Causes 106: Massive Intermediate Certificate Distrust Is on the Way</title>
      <description><![CDATA[<p>A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable.  As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys.  That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.</p>
]]></description>
      <pubDate>Tue, 14 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable.  As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys.  That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.</p>
]]></content:encoded>
      <enclosure length="25693468" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/75f3c082-0eb0-4d11-afbf-6f64aa6c821f/audio/ab184e21-dfc5-44bd-8c17-8495a1a41272/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 106: Massive Intermediate Certificate Distrust Is on the Way</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/75f3c082-0eb0-4d11-afbf-6f64aa6c821f/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:45</itunes:duration>
      <itunes:summary>A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable.  As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys.  That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.</itunes:summary>
      <itunes:subtitle>A recently identified and widespread configuration error has created a situation where, with the wrong attack on certain public roots, certificates could become essentially unrevokable.  As a consequence, 14 public CAs will have to revoke their OCSP certificates, many of which are also intermediates, and permanently discontinue use of their keys.  That leaves millions of active TLS, S/MIME, code signing, and document signing certificates in need of immediate replacement or they will be distrusted. Join our hosts as they explain what the problem is and what messy cleanup will be required to address these problems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/855109249</guid>
      <title>Root Causes 105: TOR, How and Why</title>
      <description><![CDATA[<p>Many people know that TOR is a browser used for anonymous online activity, but most of us don't know much more than that.  In this episode our hosts explain how the TOR network operates, what its potential value is, and how TOR compares to a VPN.</p>
]]></description>
      <pubDate>Wed, 8 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Many people know that TOR is a browser used for anonymous online activity, but most of us don't know much more than that.  In this episode our hosts explain how the TOR network operates, what its potential value is, and how TOR compares to a VPN.</p>
]]></content:encoded>
      <enclosure length="20095711" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9f5c7e6b-5fe8-4d27-8776-c138cd6be58a/audio/56e31898-8147-4d53-bafa-dea2180ed6d4/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 105: TOR, How and Why</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9f5c7e6b-5fe8-4d27-8776-c138cd6be58a/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:55</itunes:duration>
      <itunes:summary>Many people know that TOR is a browser used for anonymous online activity, but most of us don&apos;t know much more than that.  In this episode our hosts explain how the TOR network operates, what its potential value is, and how TOR compares to a VPN.</itunes:summary>
      <itunes:subtitle>Many people know that TOR is a browser used for anonymous online activity, but most of us don&apos;t know much more than that.  In this episode our hosts explain how the TOR network operates, what its potential value is, and how TOR compares to a VPN.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/853104193</guid>
      <title>Root Causes 104: 21 PKI Pitfalls to Avoid</title>
      <description><![CDATA[<p>Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.  In this episode they categorize twenty-one PKI pitfalls to avoid according to five main categories of error: certificate problems, deployment problems, systemic security problems, governance problems, and visibility problems. Join us for a crisp description of these twenty-one pitfalls so you can be on the lookout for them.</p>
]]></description>
      <pubDate>Mon, 6 Jul 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.  In this episode they categorize twenty-one PKI pitfalls to avoid according to five main categories of error: certificate problems, deployment problems, systemic security problems, governance problems, and visibility problems. Join us for a crisp description of these twenty-one pitfalls so you can be on the lookout for them.</p>
]]></content:encoded>
      <enclosure length="27343959" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d9dfbc65-e20c-432f-a70f-62cd60a73118/audio/1e0ec90b-36eb-46d3-a262-e136c8da7d62/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 104: 21 PKI Pitfalls to Avoid</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d9dfbc65-e20c-432f-a70f-62cd60a73118/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:28</itunes:duration>
      <itunes:summary>Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.  In this episode they categorize twenty-one PKI pitfalls to avoid according to five main categories of error: certificate problems, deployment problems, systemic security problems, governance problems, and visibility problems. Join us for a crisp description of these twenty-one pitfalls so you can be on the lookout for them.</itunes:summary>
      <itunes:subtitle>Our hosts often discuss the idea of errors in PKI implementations and the potential negative consequences for organizations.  In this episode they categorize twenty-one PKI pitfalls to avoid according to five main categories of error: certificate problems, deployment problems, systemic security problems, governance problems, and visibility problems. Join us for a crisp description of these twenty-one pitfalls so you can be on the lookout for them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/848984836</guid>
      <title>Root Causes 103: Work-from-Home IT Impact Study</title>
      <description><![CDATA[<p>The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with around the world. Sectigo recently released the results of a commissioned survey of 500 IT professionals about the impact of widespread WFH requirements on IT departments, roadmaps, security, and employee productivity. In this episode our hosts go over the biggest findings from this study.</p>
]]></description>
      <pubDate>Mon, 29 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with around the world. Sectigo recently released the results of a commissioned survey of 500 IT professionals about the impact of widespread WFH requirements on IT departments, roadmaps, security, and employee productivity. In this episode our hosts go over the biggest findings from this study.</p>
]]></content:encoded>
      <enclosure length="15858455" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/84eebd7f-65bf-41c9-a5c8-97305b403042/audio/57709b0d-5b5a-4b00-acf6-de3d5a3bf45f/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 103: Work-from-Home IT Impact Study</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/84eebd7f-65bf-41c9-a5c8-97305b403042/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:30</itunes:duration>
      <itunes:summary>The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with around the world. Sectigo recently released the results of a commissioned survey of 500 IT professionals about the impact of widespread WFH requirements on IT departments, roadmaps, security, and employee productivity. In this episode our hosts go over the biggest findings from this study.</itunes:summary>
      <itunes:subtitle>The need to suddenly enable nearly 100% of information workers for secure, productive work-from-home was a curve ball for IT departments to deal with around the world. Sectigo recently released the results of a commissioned survey of 500 IT professionals about the impact of widespread WFH requirements on IT departments, roadmaps, security, and employee productivity. In this episode our hosts go over the biggest findings from this study.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/847414321</guid>
      <title>Root Causes 102: Lawful Access to Encrypted Data Act</title>
      <description><![CDATA[<p>A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act would require service providers and device manufacturers to provide access to encrypted data based on a valid warrant. In this episode our hosts explain the bill's contents and some of the opportunities and pitfalls it presents.</p>
]]></description>
      <pubDate>Fri, 26 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act would require service providers and device manufacturers to provide access to encrypted data based on a valid warrant. In this episode our hosts explain the bill's contents and some of the opportunities and pitfalls it presents.</p>
]]></content:encoded>
      <enclosure length="15344371" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/83ae1277-9da8-41c5-bf6c-d6debffa9036/audio/c7ad08a6-42e8-46ea-b2ce-748f41f237bf/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 102: Lawful Access to Encrypted Data Act</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/83ae1277-9da8-41c5-bf6c-d6debffa9036/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:58</itunes:duration>
      <itunes:summary>A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act would require service providers and device manufacturers to provide access to encrypted data based on a valid warrant. In this episode our hosts explain the bill&apos;s contents and some of the opportunities and pitfalls it presents.</itunes:summary>
      <itunes:subtitle>A newly proposed US Senate bill called the Lawful Access to Encrypted Data Act would require service providers and device manufacturers to provide access to encrypted data based on a valid warrant. In this episode our hosts explain the bill&apos;s contents and some of the opportunities and pitfalls it presents.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/844816294</guid>
      <title>Root Causes 101: Google RCS Chat with End-to-End Encryption</title>
      <description><![CDATA[<p>Google has just announced the coming availability of end-to-end encryption for its chat service. In this episode our hosts describe the spectrum of potential protection within the capabilities we call end-to-end encryption, including forward secrecy and durability of keys.</p>
]]></description>
      <pubDate>Sun, 21 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Google has just announced the coming availability of end-to-end encryption for its chat service. In this episode our hosts describe the spectrum of potential protection within the capabilities we call end-to-end encryption, including forward secrecy and durability of keys.</p>
]]></content:encoded>
      <enclosure length="14337491" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/6c790c56-fb8e-4d7c-b050-067e6993900c/audio/d9f79054-c667-417e-9774-68652bf2e139/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 101: Google RCS Chat with End-to-End Encryption</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/6c790c56-fb8e-4d7c-b050-067e6993900c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:55</itunes:duration>
      <itunes:summary>Google has just announced the coming availability of end-to-end encryption for its chat service. In this episode our hosts describe the spectrum of potential protection within the capabilities we call end-to-end encryption, including forward secrecy and durability of keys.</itunes:summary>
      <itunes:subtitle>Google has just announced the coming availability of end-to-end encryption for its chat service. In this episode our hosts describe the spectrum of potential protection within the capabilities we call end-to-end encryption, including forward secrecy and durability of keys.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/840628249</guid>
      <title>Root Causes 100: OpenSSH Deprecates SHA-1</title>
      <description><![CDATA[<p>Once widely used, SHA-1 is considered insecure today and has been deprecated from the most common PKI use cases. OpenSSH recently provided a roadmap to its eventual deprecation of SHA-1. Join our hosts as they discuss the long, complex process of sunsetting a widely used cryptographic practice, the factors that contribute to these practices continuing beyond their secure lifespans, and the importance of crypto agility.</p>
]]></description>
      <pubDate>Mon, 15 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Once widely used, SHA-1 is considered insecure today and has been deprecated from the most common PKI use cases. OpenSSH recently provided a roadmap to its eventual deprecation of SHA-1. Join our hosts as they discuss the long, complex process of sunsetting a widely used cryptographic practice, the factors that contribute to these practices continuing beyond their secure lifespans, and the importance of crypto agility.</p>
]]></content:encoded>
      <enclosure length="11313066" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e4f17cb0-320a-4f38-8e66-4507856abf32/audio/6dc575cc-ce9a-46e6-88f7-205a17d6b83d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 100: OpenSSH Deprecates SHA-1</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e4f17cb0-320a-4f38-8e66-4507856abf32/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:46</itunes:duration>
      <itunes:summary>Once widely used, SHA-1 is considered insecure today and has been deprecated from the most common PKI use cases. OpenSSH recently provided a roadmap to its eventual deprecation of SHA-1. Join our hosts as they discuss the long, complex process of sunsetting a widely used cryptographic practice, the factors that contribute to these practices continuing beyond their secure lifespans, and the importance of crypto agility.</itunes:summary>
      <itunes:subtitle>Once widely used, SHA-1 is considered insecure today and has been deprecated from the most common PKI use cases. OpenSSH recently provided a roadmap to its eventual deprecation of SHA-1. Join our hosts as they discuss the long, complex process of sunsetting a widely used cryptographic practice, the factors that contribute to these practices continuing beyond their secure lifespans, and the importance of crypto agility.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/839089006</guid>
      <title>Root Causes 99: AddTrust Root Expiration Explained</title>
      <description><![CDATA[<p>The recent expiration of Sectigo's AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend until all was fixed. In this episode we explain roots, root expirations, why they are a non event for most users, and why sometimes an expiration can be more impactful.</p>
]]></description>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>The recent expiration of Sectigo's AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend until all was fixed. In this episode we explain roots, root expirations, why they are a non event for most users, and why sometimes an expiration can be more impactful.</p>
]]></content:encoded>
      <enclosure length="27296734" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/683d515a-79d0-488d-8ef4-f68a0b7fe152/audio/24942950-d386-44cd-b435-43ed2943b807/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 99: AddTrust Root Expiration Explained</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/683d515a-79d0-488d-8ef4-f68a0b7fe152/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:25</itunes:duration>
      <itunes:summary>The recent expiration of Sectigo&apos;s AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend until all was fixed. In this episode we explain roots, root expirations, why they are a non event for most users, and why sometimes an expiration can be more impactful.</itunes:summary>
      <itunes:subtitle>The recent expiration of Sectigo&apos;s AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend until all was fixed. In this episode we explain roots, root expirations, why they are a non event for most users, and why sometimes an expiration can be more impactful.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/836405848</guid>
      <title>Root Causes 98: DMARC and Verified Mark Certificates for Email</title>
      <description><![CDATA[<p>A new kind of identity certificate is coming that will enable businesses to include their logos in official email they send in order to improve customer confidence and protect against phishing. It is called a Verified Mark Certificate (VMC) and is built upon the DMARC standard, which controls which senders are allowed to send email using any given From address. In this episode our hosts explain VMCs and DMARC and how they will be used and then discuss where they fit in with S/MIME email certificates.</p>
]]></description>
      <pubDate>Mon, 8 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>A new kind of identity certificate is coming that will enable businesses to include their logos in official email they send in order to improve customer confidence and protect against phishing. It is called a Verified Mark Certificate (VMC) and is built upon the DMARC standard, which controls which senders are allowed to send email using any given From address. In this episode our hosts explain VMCs and DMARC and how they will be used and then discuss where they fit in with S/MIME email certificates.</p>
]]></content:encoded>
      <enclosure length="12142877" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/0ecb7349-2b85-40b6-a9f5-c271dabc810c/audio/554ad833-0b94-4578-bcfa-6874ef32bcdf/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 98: DMARC and Verified Mark Certificates for Email</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/0ecb7349-2b85-40b6-a9f5-c271dabc810c/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:38</itunes:duration>
      <itunes:summary>A new kind of identity certificate is coming that will enable businesses to include their logos in official email they send in order to improve customer confidence and protect against phishing. It is called a Verified Mark Certificate (VMC) and is built upon the DMARC standard, which controls which senders are allowed to send email using any given From address. In this episode our hosts explain VMCs and DMARC and how they will be used and then discuss where they fit in with S/MIME email certificates.</itunes:summary>
      <itunes:subtitle>A new kind of identity certificate is coming that will enable businesses to include their logos in official email they send in order to improve customer confidence and protect against phishing. It is called a Verified Mark Certificate (VMC) and is built upon the DMARC standard, which controls which senders are allowed to send email using any given From address. In this episode our hosts explain VMCs and DMARC and how they will be used and then discuss where they fit in with S/MIME email certificates.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/834014986</guid>
      <title>Root Causes 97: Firefox to Deprecate Support for FTP</title>
      <description><![CDATA[<p>Mozilla has announced its intention to remove support for FTP from the Firefox browser, citing concerns about security and the degree of effort required to keep this functionality current. Join our hosts as they discuss this announcement and its potential effects as well as the considerations that go into choosing when to drop support for outdated, unpopular, or sub-optimal capabilities in technology products.</p>
]]></description>
      <pubDate>Thu, 4 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Mozilla has announced its intention to remove support for FTP from the Firefox browser, citing concerns about security and the degree of effort required to keep this functionality current. Join our hosts as they discuss this announcement and its potential effects as well as the considerations that go into choosing when to drop support for outdated, unpopular, or sub-optimal capabilities in technology products.</p>
]]></content:encoded>
      <enclosure length="10888845" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/16fd4aa1-8a69-42cc-9174-c594727271e7/audio/85a6add2-3879-4e90-9703-3fbf8ddfc38a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 97: Firefox to Deprecate Support for FTP</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/16fd4aa1-8a69-42cc-9174-c594727271e7/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:20</itunes:duration>
      <itunes:summary>Mozilla has announced its intention to remove support for FTP from the Firefox browser, citing concerns about security and the degree of effort required to keep this functionality current. Join our hosts as they discuss this announcement and its potential effects as well as the considerations that go into choosing when to drop support for outdated, unpopular, or sub-optimal capabilities in technology products.</itunes:summary>
      <itunes:subtitle>Mozilla has announced its intention to remove support for FTP from the Firefox browser, citing concerns about security and the degree of effort required to keep this functionality current. Join our hosts as they discuss this announcement and its potential effects as well as the considerations that go into choosing when to drop support for outdated, unpopular, or sub-optimal capabilities in technology products.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/832194748</guid>
      <title>Root Causes 96: Signal May Leave the USA to Protect Its End-to-End Encryption</title>
      <description><![CDATA[<p>Congress's proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication. In recent news, secure communication app Signal has floated the idea of relocating outside the United States if that's what's required to retain its ability to offer end-to-end encryption without spying eyes interfering.</p>
<p>In this week's episode, we discuss this announcement and related issues surrounding the keeping of digital secrets and encryption.</p>
]]></description>
      <pubDate>Mon, 1 Jun 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Congress's proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication. In recent news, secure communication app Signal has floated the idea of relocating outside the United States if that's what's required to retain its ability to offer end-to-end encryption without spying eyes interfering.</p>
<p>In this week's episode, we discuss this announcement and related issues surrounding the keeping of digital secrets and encryption.</p>
]]></content:encoded>
      <enclosure length="17129696" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/ef03a6f1-a495-4d39-bca6-e051a0fa54e8/audio/ade188b8-a649-435b-9dd2-ef80b42723a1/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 96: Signal May Leave the USA to Protect Its End-to-End Encryption</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/ef03a6f1-a495-4d39-bca6-e051a0fa54e8/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:50</itunes:duration>
      <itunes:summary>Congress&apos;s proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication. In recent news, secure communication app Signal has floated the idea of relocating outside the United States if that&apos;s what&apos;s required to retain its ability to offer end-to-end encryption without spying eyes interfering.

In this week&apos;s episode, we discuss this announcement and related issues surrounding the keeping of digital secrets and encryption.</itunes:summary>
      <itunes:subtitle>Congress&apos;s proposed EARN IT act has many industry observers worried about its potential effect on the integrity of encrypted communication. In recent news, secure communication app Signal has floated the idea of relocating outside the United States if that&apos;s what&apos;s required to retain its ability to offer end-to-end encryption without spying eyes interfering.

In this week&apos;s episode, we discuss this announcement and related issues surrounding the keeping of digital secrets and encryption.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/830618725</guid>
      <title>Root Causes 95: Cryptographic Key Vaulting</title>
      <description><![CDATA[<p>For PKI to be secure, private keys need to remain private. In this episode we explain &quot;vaulting&quot; for keys or other shared secrets. We touch on the vulnerabilities that secrets vaulting fights against and the common use cases for vaulting.</p>
]]></description>
      <pubDate>Thu, 28 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>For PKI to be secure, private keys need to remain private. In this episode we explain &quot;vaulting&quot; for keys or other shared secrets. We touch on the vulnerabilities that secrets vaulting fights against and the common use cases for vaulting.</p>
]]></content:encoded>
      <enclosure length="12292262" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/846e161d-7a4d-4a56-97fd-fa125d0f0e4d/audio/4c7f3e8f-9484-4676-8a5c-5f002c40f5b3/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 95: Cryptographic Key Vaulting</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/846e161d-7a4d-4a56-97fd-fa125d0f0e4d/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:47</itunes:duration>
      <itunes:summary>For PKI to be secure, private keys need to remain private. In this episode we explain &quot;vaulting&quot; for keys or other shared secrets. We touch on the vulnerabilities that secrets vaulting fights against and the common use cases for vaulting.</itunes:summary>
      <itunes:subtitle>For PKI to be secure, private keys need to remain private. In this episode we explain &quot;vaulting&quot; for keys or other shared secrets. We touch on the vulnerabilities that secrets vaulting fights against and the common use cases for vaulting.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/828442555</guid>
      <title>Root Causes 94: Revocation Checking Through OCSP and CRL</title>
      <description><![CDATA[<p>One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.</p>
]]></description>
      <pubDate>Tue, 26 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.</p>
]]></content:encoded>
      <enclosure length="22669085" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/576a7d61-fa80-448f-bf6c-aa439ab202c9/audio/50f28761-d490-4912-8d22-d0749101069b/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 94: Revocation Checking Through OCSP and CRL</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/576a7d61-fa80-448f-bf6c-aa439ab202c9/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:36</itunes:duration>
      <itunes:summary>One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.</itunes:summary>
      <itunes:subtitle>One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/825156877</guid>
      <title>Root Causes 93: Videoconferencing Phishing</title>
      <description><![CDATA[<p>With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.</p>
]]></description>
      <pubDate>Thu, 21 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>With the global workforce's massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.</p>
]]></content:encoded>
      <enclosure length="13657365" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/fdbf626a-29ab-48cb-9d9c-80219d9a0f26/audio/3ecd4c46-979c-4613-9e32-ce92f3f41291/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 93: Videoconferencing Phishing</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/fdbf626a-29ab-48cb-9d9c-80219d9a0f26/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:13</itunes:duration>
      <itunes:summary>With the global workforce&apos;s massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.</itunes:summary>
      <itunes:subtitle>With the global workforce&apos;s massive shift to work-from-home, a clever new set of opportunistic social engineering attacks has sprung up to take advantage of our unfamiliarity with our new communication and collaboration applications and processes. In this episode our hosts describe these new attacks and what IT departments can do to combat them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/823187869</guid>
      <title>Root Causes 92: COVID-19 Immunity Passports</title>
      <description><![CDATA[<p>As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic &quot;immunity passport&quot; that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection).  Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.</p>
]]></description>
      <pubDate>Mon, 18 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic &quot;immunity passport&quot; that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection).  Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.</p>
]]></content:encoded>
      <enclosure length="20359979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/31ef8d88-7f2e-49f0-8973-af09a653e39a/audio/4c16784f-60ce-431d-9164-c75f1dce5b43/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 92: COVID-19 Immunity Passports</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/31ef8d88-7f2e-49f0-8973-af09a653e39a/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:12</itunes:duration>
      <itunes:summary>As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic &quot;immunity passport&quot; that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection).  Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.</itunes:summary>
      <itunes:subtitle>As we plan our societal return to normalcy, a number of people and groups are discussing the concept of an electronic &quot;immunity passport&quot; that individuals can possess if they are known to be immune to COVID-19 (possibly through vaccination or prior infection).  Today our hosts discuss the requirements for such an immunity passport, some of the opportunities and challenges in putting this kind of system in place, and how existing schemes and systems may fit into an immunity passport initiative.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/820638553</guid>
      <title>Root Causes 91: Rabobank Banking App Outage</title>
      <description><![CDATA[<p>Australia's Rabobank recently experienced an outage preventing its Android banking app from connecting to its servers. The root cause? An expired certificate. In this episode our hosts explain what happened and how it could have been avoided. They also discuss certificate pinning, how it came to be used with apps like this one, and its disadvantages.</p>
]]></description>
      <pubDate>Wed, 13 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Australia's Rabobank recently experienced an outage preventing its Android banking app from connecting to its servers. The root cause? An expired certificate. In this episode our hosts explain what happened and how it could have been avoided. They also discuss certificate pinning, how it came to be used with apps like this one, and its disadvantages.</p>
]]></content:encoded>
      <enclosure length="11541997" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9dd6756d-b2fe-4b0b-b215-5fca4a63928d/audio/e9e17f93-b364-459e-910d-9f624720013e/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 91: Rabobank Banking App Outage</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9dd6756d-b2fe-4b0b-b215-5fca4a63928d/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:00</itunes:duration>
      <itunes:summary>Australia&apos;s Rabobank recently experienced an outage preventing its Android banking app from connecting to its servers. The root cause? An expired certificate. In this episode our hosts explain what happened and how it could have been avoided. They also discuss certificate pinning, how it came to be used with apps like this one, and its disadvantages.</itunes:summary>
      <itunes:subtitle>Australia&apos;s Rabobank recently experienced an outage preventing its Android banking app from connecting to its servers. The root cause? An expired certificate. In this episode our hosts explain what happened and how it could have been avoided. They also discuss certificate pinning, how it came to be used with apps like this one, and its disadvantages.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/818315665</guid>
      <title>Root Causes 90: An Analysis of Distributed PKI</title>
      <description><![CDATA[<p>Distributed PKI is a new approach, with advocates saying it will eliminate many weaknesses they perceive with traditional, hierarchical PKI architecture. Guest Alan Grau joins our hosts at they explain how distributed PKI works, describe its proclaimed benefits, and take a hard look at whether or not these claims hold up.</p>
]]></description>
      <pubDate>Sun, 10 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Distributed PKI is a new approach, with advocates saying it will eliminate many weaknesses they perceive with traditional, hierarchical PKI architecture. Guest Alan Grau joins our hosts at they explain how distributed PKI works, describe its proclaimed benefits, and take a hard look at whether or not these claims hold up.</p>
]]></content:encoded>
      <enclosure length="23576842" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/354d9357-12e3-4757-81c2-64b23b0cd376/audio/c38e338a-ee87-4f6d-b73e-71ab1a73f6ee/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 90: An Analysis of Distributed PKI</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/354d9357-12e3-4757-81c2-64b23b0cd376/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:33</itunes:duration>
      <itunes:summary>Distributed PKI is a new approach, with advocates saying it will eliminate many weaknesses they perceive with traditional, hierarchical PKI architecture. Guest Alan Grau joins our hosts at they explain how distributed PKI works, describe its proclaimed benefits, and take a hard look at whether or not these claims hold up.</itunes:summary>
      <itunes:subtitle>Distributed PKI is a new approach, with advocates saying it will eliminate many weaknesses they perceive with traditional, hierarchical PKI architecture. Guest Alan Grau joins our hosts at they explain how distributed PKI works, describe its proclaimed benefits, and take a hard look at whether or not these claims hold up.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/815623081</guid>
      <title>Root Causes 89: PKI&apos;s Role in Zero Trust</title>
      <description><![CDATA[<p>&quot;Zero Trust&quot; is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization's environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.</p>
]]></description>
      <pubDate>Thu, 7 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>&quot;Zero Trust&quot; is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization's environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.</p>
]]></content:encoded>
      <enclosure length="19348229" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/5b284b40-34fa-4ffb-81e5-881a3d169bea/audio/457effa2-8137-49a3-928b-6b6069ee5e7c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 89: PKI&apos;s Role in Zero Trust</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/5b284b40-34fa-4ffb-81e5-881a3d169bea/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:08</itunes:duration>
      <itunes:summary>&quot;Zero Trust&quot; is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization&apos;s environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.</itunes:summary>
      <itunes:subtitle>&quot;Zero Trust&quot; is an IT security philosophy that maximizes protection from threats by tightly controlling access and permissions for every individual, device, and process in the organization&apos;s environment. Learn how digital identity and certificates play a key role in operating a secure Zero Trust strategy.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/813625354</guid>
      <title>Root Causes 88: PKI and Blockchain</title>
      <description><![CDATA[<p>Many observers notice similarities between PKI and blockchain, including their applicability to secure digital systems and their ability to enable authentic information and non-repudiation in an electronic environment. Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain, explain the qualities of a good use case for each, and describe how they can complement each other.</p>
]]></description>
      <pubDate>Mon, 4 May 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Many observers notice similarities between PKI and blockchain, including their applicability to secure digital systems and their ability to enable authentic information and non-repudiation in an electronic environment. Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain, explain the qualities of a good use case for each, and describe how they can complement each other.</p>
]]></content:encoded>
      <enclosure length="12534841" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/9e002801-bbfa-40cf-b6d8-941a02009d00/audio/f024a904-209d-4107-9ae9-12845520417d/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 88: PKI and Blockchain</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/9e002801-bbfa-40cf-b6d8-941a02009d00/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:02</itunes:duration>
      <itunes:summary>Many observers notice similarities between PKI and blockchain, including their applicability to secure digital systems and their ability to enable authentic information and non-repudiation in an electronic environment. Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain, explain the qualities of a good use case for each, and describe how they can complement each other.</itunes:summary>
      <itunes:subtitle>Many observers notice similarities between PKI and blockchain, including their applicability to secure digital systems and their ability to enable authentic information and non-repudiation in an electronic environment. Join our hosts and expert guest Alan Grau as they go over the similarities and differences between PKI and blockchain, explain the qualities of a good use case for each, and describe how they can complement each other.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/810558496</guid>
      <title>Root Causes 87: Zoom&apos;s (Not) End-to-End Encryption</title>
      <description><![CDATA[<p>With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology. In particular, Zoom has claimed to offer end-to-end encryption while in fact it does not, making headlines across media of all sorts. In this episode our hosts explain what end-to-end encryption is and why the distinction is important for a service like Zoom.</p>
]]></description>
      <pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology. In particular, Zoom has claimed to offer end-to-end encryption while in fact it does not, making headlines across media of all sorts. In this episode our hosts explain what end-to-end encryption is and why the distinction is important for a service like Zoom.</p>
]]></content:encoded>
      <enclosure length="16858329" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/d69f6fe8-7c85-4638-bc6e-5794fee77eb1/audio/1017f8d7-7d4e-4160-bca1-74ba997bc82a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 87: Zoom&apos;s (Not) End-to-End Encryption</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/d69f6fe8-7c85-4638-bc6e-5794fee77eb1/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:33</itunes:duration>
      <itunes:summary>With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology. In particular, Zoom has claimed to offer end-to-end encryption while in fact it does not, making headlines across media of all sorts. In this episode our hosts explain what end-to-end encryption is and why the distinction is important for a service like Zoom.</itunes:summary>
      <itunes:subtitle>With lockdowns and working from home the norm, a great deal of attention has been paid to video conferencing technology. In particular, Zoom has claimed to offer end-to-end encryption while in fact it does not, making headlines across media of all sorts. In this episode our hosts explain what end-to-end encryption is and why the distinction is important for a service like Zoom.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/808274044</guid>
      <title>Root Causes 86: SSH Keys</title>
      <description><![CDATA[<p>SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.</p>
]]></description>
      <pubDate>Mon, 27 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.</p>
]]></content:encoded>
      <enclosure length="17356400" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/416777af-a259-4c02-8f88-7f95eba1b64b/audio/a7827126-8ca0-4f68-bb0c-9eef2ab37135/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 86: SSH Keys</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/416777af-a259-4c02-8f88-7f95eba1b64b/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:04</itunes:duration>
      <itunes:summary>SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.</itunes:summary>
      <itunes:subtitle>SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/805466206</guid>
      <title>Root Causes 85: Automotive Key Fobs and Cryptography</title>
      <description><![CDATA[<p>Recent headlines have unveiled high profile attacks against automobile key fobs. Such an attack is potentially huge since successfully mimicking these fobs can yield complete access to an automobile's capabilities. Our hosts are joined by repeat guest Alan Grau as they describe the cryptographic architecture of a modern automotive key fob, how these attacks take place, and what automobile manufacturers can do about it.</p>
]]></description>
      <pubDate>Thu, 23 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Recent headlines have unveiled high profile attacks against automobile key fobs. Such an attack is potentially huge since successfully mimicking these fobs can yield complete access to an automobile's capabilities. Our hosts are joined by repeat guest Alan Grau as they describe the cryptographic architecture of a modern automotive key fob, how these attacks take place, and what automobile manufacturers can do about it.</p>
]]></content:encoded>
      <enclosure length="16221577" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/190124ce-727f-4ed5-a742-bca8d7a9a48f/audio/6cbdc81d-2e01-416e-9cdf-6dce6e036c1a/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 85: Automotive Key Fobs and Cryptography</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/190124ce-727f-4ed5-a742-bca8d7a9a48f/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:53</itunes:duration>
      <itunes:summary>Recent headlines have unveiled high profile attacks against automobile key fobs. Such an attack is potentially huge since successfully mimicking these fobs can yield complete access to an automobile&apos;s capabilities. Our hosts are joined by repeat guest Alan Grau as they describe the cryptographic architecture of a modern automotive key fob, how these attacks take place, and what automobile manufacturers can do about it.</itunes:summary>
      <itunes:subtitle>Recent headlines have unveiled high profile attacks against automobile key fobs. Such an attack is potentially huge since successfully mimicking these fobs can yield complete access to an automobile&apos;s capabilities. Our hosts are joined by repeat guest Alan Grau as they describe the cryptographic architecture of a modern automotive key fob, how these attacks take place, and what automobile manufacturers can do about it.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/803109313</guid>
      <title>Root Causes 84: What Is DNS over HTTPS?</title>
      <description><![CDATA[<p>DNS over HTTPS is a capability whereby DNS lookups can be encrypted to defend against certain man-in-the-middle attacks as well as protecting information about web usage from being revealed to third parties. In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works. They also explain some of the controversy and potential concerns that have been raised with this approach.</p>
]]></description>
      <pubDate>Mon, 20 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>DNS over HTTPS is a capability whereby DNS lookups can be encrypted to defend against certain man-in-the-middle attacks as well as protecting information about web usage from being revealed to third parties. In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works. They also explain some of the controversy and potential concerns that have been raised with this approach.</p>
]]></content:encoded>
      <enclosure length="8422771" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/aff6ea0a-34aa-4157-a7ef-4261ba52fd06/audio/3b303e6a-bcbf-4710-a185-64376b26a7a5/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 84: What Is DNS over HTTPS?</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/aff6ea0a-34aa-4157-a7ef-4261ba52fd06/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:45</itunes:duration>
      <itunes:summary>DNS over HTTPS is a capability whereby DNS lookups can be encrypted to defend against certain man-in-the-middle attacks as well as protecting information about web usage from being revealed to third parties. In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works. They also explain some of the controversy and potential concerns that have been raised with this approach.</itunes:summary>
      <itunes:subtitle>DNS over HTTPS is a capability whereby DNS lookups can be encrypted to defend against certain man-in-the-middle attacks as well as protecting information about web usage from being revealed to third parties. In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works. They also explain some of the controversy and potential concerns that have been raised with this approach.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/800168941</guid>
      <title>Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date</title>
      <description><![CDATA[<p>Lock downs and work-from-home requirements have disrupted the efficiency of operations in all walks of industry, including academics and advanced computing research. In this episode our hosts debate if and how the pandemic's disruptive nature might change the date on which quantum computers are able to defeat today's encryption.</p>
]]></description>
      <pubDate>Thu, 16 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>Lock downs and work-from-home requirements have disrupted the efficiency of operations in all walks of industry, including academics and advanced computing research. In this episode our hosts debate if and how the pandemic's disruptive nature might change the date on which quantum computers are able to defeat today's encryption.</p>
]]></content:encoded>
      <enclosure length="24355185" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/64542ad6-05bc-43f2-ab76-254d9b15ac02/audio/4180da22-04ba-46f2-aff7-8e1e3547325c/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 83: Quantum Apocalypse - Does COVID-19 Change the Z Date</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/64542ad6-05bc-43f2-ab76-254d9b15ac02/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:21</itunes:duration>
      <itunes:summary>Lock downs and work-from-home requirements have disrupted the efficiency of operations in all walks of industry, including academics and advanced computing research. In this episode our hosts debate if and how the pandemic&apos;s disruptive nature might change the date on which quantum computers are able to defeat today&apos;s encryption.</itunes:summary>
      <itunes:subtitle>Lock downs and work-from-home requirements have disrupted the efficiency of operations in all walks of industry, including academics and advanced computing research. In this episode our hosts debate if and how the pandemic&apos;s disruptive nature might change the date on which quantum computers are able to defeat today&apos;s encryption.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/797467135</guid>
      <title>Root Causes 82: The Death of the Hard Token</title>
      <description><![CDATA[<p>People are working from home in unprecedented numbers, which means that companies need to find ways for them to connect securely. Some will consider hard tokens as an option. In this episode our hosts give a frank assessment of the difficulty that hard tokens present for the modern remote workforce, along with some of the other available options that are likely to serve the enterprise better.</p>
]]></description>
      <pubDate>Mon, 13 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan and Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <content:encoded><![CDATA[<p>People are working from home in unprecedented numbers, which means that companies need to find ways for them to connect securely. Some will consider hard tokens as an option. In this episode our hosts give a frank assessment of the difficulty that hard tokens present for the modern remote workforce, along with some of the other available options that are likely to serve the enterprise better.</p>
]]></content:encoded>
      <enclosure length="15750158" type="audio/mpeg" url="https://cdn.simplecast.com/audio/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/e2c34d82-f8aa-4b8c-b8fe-e3485ff5a969/audio/9b302ff4-0631-4d45-b353-a64d812abaa0/default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 82: The Death of the Hard Token</itunes:title>
      <itunes:author>Tim Callan and Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/4ec7ff/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/e2c34d82-f8aa-4b8c-b8fe-e3485ff5a969/3000x3000/artworks-txsqwld0lif9gcsg-f8ohlg-t3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:23</itunes:duration>
      <itunes:summary>People are working from home in unprecedented numbers, which means that companies need to find ways for them to connect securely. Some will consider hard tokens as an option. In this episode our hosts give a frank assessment of the difficulty that hard tokens present for the modern remote workforce, along with some of the other available options that are likely to serve the enterprise better.</itunes:summary>
      <itunes:subtitle>People are working from home in unprecedented numbers, which means that companies need to find ways for them to connect securely. Some will consider hard tokens as an option. In this episode our hosts give a frank assessment of the difficulty that hard tokens present for the modern remote workforce, along with some of the other available options that are likely to serve the enterprise better.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>0</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">91e24487-f013-49d5-8b2d-83638cc095c0</guid>
      <title>Root Causes 81: What Is Embedded Firewall?</title>
      <description><![CDATA[Security for IoT devices depends not only on establishing strong identity mechanisms for devices and the services they connect to but also in ensuring the ongoing integrity of device operations. In this episode our hosts are joined by guest Alan Grau to explain what an embedded firewall is and how it aids security for connected devices. 
]]></description>
      <pubDate>Mon, 6 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9ca63288-62ee-4f8b-80f9-25b7522a8d30/811280.png" width="1280"/>
      <enclosure length="14014341" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/fd05fdc9-f645-49a3-b9cc-22c8b4e9f060/group-item/889312eb-f65a-4750-8209-164ff0fab570/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 81: What Is Embedded Firewall?</itunes:title>
      <itunes:author>Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/e25cc569-6f7e-41f4-aead-7ffaf54411c8/3000x3000/81.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:35</itunes:duration>
      <itunes:summary>Security for IoT devices depends not only on establishing strong identity mechanisms for devices and the services they connect to but also in ensuring the ongoing integrity of device operations. In this episode our hosts are joined by guest Alan Grau to explain what an embedded firewall is and how it aids security for connected devices.</itunes:summary>
      <itunes:subtitle>Security for IoT devices depends not only on establishing strong identity mechanisms for devices and the services they connect to but also in ensuring the ongoing integrity of device operations. In this episode our hosts are joined by guest Alan Grau to explain what an embedded firewall is and how it aids security for connected devices.</itunes:subtitle>
      <itunes:keywords>cybersecurity, firewall, pki, embedded</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ebed29c-9c40-4409-b928-bffb0571ffbf</guid>
      <title>Root Causes 80: The Pros and Cons of VPNs</title>
      <description><![CDATA[With the sudden, meteoric increase in remote workers, many IT professionals are looking at VPN as a method of keeping them secure.  Join our hosts as they discuss the advantages and disadvantages of VPNs, and what to look out for. 
]]></description>
      <pubDate>Thu, 2 Apr 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="15722958" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/95552ebd-2a42-41a3-a342-6eba43bd708c/group-item/44dc2c54-ff0d-4fb5-b2c3-c0db4d7b9373/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 80: The Pros and Cons of VPNs</itunes:title>
      <itunes:author>Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/5e4a08e5-9c5e-48b4-935e-3ebffd471b2f/3000x3000/80.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:22</itunes:duration>
      <itunes:summary>With the sudden, meteoric increase in remote workers, many IT professionals are looking at VPN as a method of keeping them secure.  Join our hosts as they discuss the advantages and disadvantages of VPNs, and what to look out for.</itunes:summary>
      <itunes:subtitle>With the sudden, meteoric increase in remote workers, many IT professionals are looking at VPN as a method of keeping them secure.  Join our hosts as they discuss the advantages and disadvantages of VPNs, and what to look out for.</itunes:subtitle>
      <itunes:keywords>cybersecurity, vpn, pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b84743d1-92fc-4acb-9952-44ed5f2b0d93</guid>
      <title>Root Causes 79: Firefox Reinstates Support for Deprecated TLS Versions</title>
      <description><![CDATA[To enable broadest possible access to valuable information about the COVID-19 epidemic, Firefox has chosen to reinstate support for web sites using TLS 1.0 and 1.1. Join us to learn about this move, why Firefox has made it, and what that says about the state of web site security today. 
]]></description>
      <pubDate>Mon, 30 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="10975349" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/36f5689f-a649-40a0-8b68-60aa0e663701/group-item/7f2427bd-e6da-4fe0-b97c-d2fe77e7f094/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 79: Firefox Reinstates Support for Deprecated TLS Versions</itunes:title>
      <itunes:author>Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/bdbb5be0-6daf-4c24-b8a7-d4f1ca54a84c/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:25</itunes:duration>
      <itunes:summary>To enable broadest possible access to valuable information about the COVID-19 epidemic, Firefox has chosen to reinstate support for web sites using TLS 1.0 and 1.1. Join us to learn about this move, why Firefox has made it, and what that says about the state of web site security today.</itunes:summary>
      <itunes:subtitle>To enable broadest possible access to valuable information about the COVID-19 epidemic, Firefox has chosen to reinstate support for web sites using TLS 1.0 and 1.1. Join us to learn about this move, why Firefox has made it, and what that says about the state of web site security today.</itunes:subtitle>
      <itunes:keywords>tls, firefox, pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">025533d3-5076-4c24-9a29-c8a4e89b93bd</guid>
      <title>Root Causes 78: Extended Validation Certificates and the Dark Web</title>
      <description><![CDATA[New research presented at RSA Security Expo indicates that at least one party is using online criminal marketplaces to sell a package of a newly-created business and at least one Extended Validation SSL certificate to go with it.  Join our hosts as they explain what the research says and talk about the potential criminal use cases for a bundle like this one. 
]]></description>
      <pubDate>Thu, 26 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14111308" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4e2beddc-1e61-423f-b6e4-2eaa2a4620c2/group-item/9fe1d0f9-b0a1-41e7-9e43-f96d48e07a05/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 78: Extended Validation Certificates and the Dark Web</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/c9bed521-8ece-43a6-b6d3-1d8a166bb65f/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:41</itunes:duration>
      <itunes:summary>New research presented at RSA Security Expo indicates that at least one party is using online criminal marketplaces to sell a package of a newly-created business and at least one Extended Validation SSL certificate to go with it.  Join our hosts as they explain what the research says and talk about the potential criminal use cases for a bundle like this one.</itunes:summary>
      <itunes:subtitle>New research presented at RSA Security Expo indicates that at least one party is using online criminal marketplaces to sell a package of a newly-created business and at least one Extended Validation SSL certificate to go with it.  Join our hosts as they explain what the research says and talk about the potential criminal use cases for a bundle like this one.</itunes:subtitle>
      <itunes:keywords>x509, ev, certificates, pki, webpki, dark web</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2b97cbef-dcc6-440d-85d3-e20f9de4bb60</guid>
      <title>Root Causes 77: Certificates for Public Cloud</title>
      <description><![CDATA[As a convenience to customers and a competitive differentiator, public cloud services such as AWS offer TLS certificates for use in their environments. Join our hosts as they explain this practice, how these certificates can be used, and which use cases and environments will not work with TLS certificates from public cloud vendors. 
]]></description>
      <pubDate>Mon, 23 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="8988800" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/2063c768-95f4-479d-b340-d81caf1d505f/group-item/0bfa7e13-bfad-4e31-acbc-ca116e93d1fe/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 77: Certificates for Public Cloud</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9e9ef1f0-9bd5-4491-beb1-9bda3c54aba2/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:21</itunes:duration>
      <itunes:summary>As a convenience to customers and a competitive differentiator, public cloud services such as AWS offer TLS certificates for use in their environments. Join our hosts as they explain this practice, how these certificates can be used, and which use cases and environments will not work with TLS certificates from public cloud vendors.</itunes:summary>
      <itunes:subtitle>As a convenience to customers and a competitive differentiator, public cloud services such as AWS offer TLS certificates for use in their environments. Join our hosts as they explain this practice, how these certificates can be used, and which use cases and environments will not work with TLS certificates from public cloud vendors.</itunes:subtitle>
      <itunes:keywords>tls, digital certificates, hyperscalers, cloud, x509, pki, webpki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">84ee2046-4b92-416a-86e5-8d25d5b9b2da</guid>
      <title>Root Causes 76: Implications of COVID-19 for PKI</title>
      <description><![CDATA[COVID-19 is rocking all aspects of our daily and business lives. So what are the implications of lock-downs, office closures, and high employee absenteeism on the PKI world? Our hosts explore the implications of our new post-pandemic work culture on business continuity and security, and how PKI fits into this new way of working 
]]></description>
      <pubDate>Fri, 20 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="25741440" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/eb8eb5d4-3a89-408e-8643-e8a2425763e2/group-item/0055b1de-d1b9-4b9b-bde3-aae216eee038/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 76: Implications of COVID-19 for PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/7bd0bfa1-f805-4602-8691-f84e077af525/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:48</itunes:duration>
      <itunes:summary>COVID-19 is rocking all aspects of our daily and business lives. So what are the implications of lock-downs, office closures, and high employee absenteeism on the PKI world? Our hosts explore the implications of our new post-pandemic work culture on business continuity and security, and how PKI fits into this new way of working</itunes:summary>
      <itunes:subtitle>COVID-19 is rocking all aspects of our daily and business lives. So what are the implications of lock-downs, office closures, and high employee absenteeism on the PKI world? Our hosts explore the implications of our new post-pandemic work culture on business continuity and security, and how PKI fits into this new way of working</itunes:subtitle>
      <itunes:keywords>pki, webpki, covid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c67df27-5d47-4e5a-aefd-df735b531c2a</guid>
      <title>Root Causes 75: Sectigo&apos;s COVID-19 Readiness</title>
      <description><![CDATA[As measures move into place throughout society to flatten the curve of COVID-19's spread, it is important to understand the potential effects of lock downs, school closures, and work-from-home mandates on the critical systems that keep our digital world running.  Sectigo has conducted an internal audit of its business continuity and disaster recovery plans in light of the specifics of the ongoing pandemic, and we remain confident in our ongoing operation without material disruption through the present crisis. In this episode our hosts go over the results of Sectigo's COVID-19 readiness audit and what customers can expect in the months to come. 
]]></description>
      <pubDate>Wed, 18 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="4494903" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/44bc8d86-6864-41af-aebc-173e8b98b081/group-item/29465afb-54bb-4bb6-a1fd-5ec763bd7ed7/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 75: Sectigo&apos;s COVID-19 Readiness</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9d78bddf-b3d2-477d-bc18-b78bb5615947/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:04:40</itunes:duration>
      <itunes:summary>As measures move into place throughout society to flatten the curve of COVID-19&apos;s spread, it is important to understand the potential effects of lock downs, school closures, and work-from-home mandates on the critical systems that keep our digital world running.  Sectigo has conducted an internal audit of its business continuity and disaster recovery plans in light of the specifics of the ongoing pandemic, and we remain confident in our ongoing operation without material disruption through the present crisis. In this episode our hosts go over the results of Sectigo&apos;s COVID-19 readiness audit and what customers can expect in the months to come.</itunes:summary>
      <itunes:subtitle>As measures move into place throughout society to flatten the curve of COVID-19&apos;s spread, it is important to understand the potential effects of lock downs, school closures, and work-from-home mandates on the critical systems that keep our digital world running.  Sectigo has conducted an internal audit of its business continuity and disaster recovery plans in light of the specifics of the ongoing pandemic, and we remain confident in our ongoing operation without material disruption through the present crisis. In this episode our hosts go over the results of Sectigo&apos;s COVID-19 readiness audit and what customers can expect in the months to come.</itunes:subtitle>
      <itunes:keywords>readiness, sectigo, covid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ed51bdd9-fbfd-4ae5-bf69-205ad0946407</guid>
      <title>Root Causes 74: Device and Network Access</title>
      <description><![CDATA[Certificates can play a critical role in enabling and controlling access for users and devices to our sensitive business processes and data.  Our hosts are joined once again by David Colon as we explore the role certificates play in providing network access and permissions, including some best practices. 
]]></description>
      <pubDate>Tue, 17 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14153911" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4bb6ab4c-f1d8-499e-9c3f-3b713d2c47e9/group-item/6072e221-19b0-42d9-9725-2ad406c6c8f5/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 74: Device and Network Access</itunes:title>
      <itunes:author>Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/05ab8b82-9461-4527-aec2-29074ee40882/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:44</itunes:duration>
      <itunes:summary>Certificates can play a critical role in enabling and controlling access for users and devices to our sensitive business processes and data.  Our hosts are joined once again by David Colon as we explore the role certificates play in providing network access and permissions, including some best practices.</itunes:summary>
      <itunes:subtitle>Certificates can play a critical role in enabling and controlling access for users and devices to our sensitive business processes and data.  Our hosts are joined once again by David Colon as we explore the role certificates play in providing network access and permissions, including some best practices.</itunes:subtitle>
      <itunes:keywords>tls, access control, x509, pki, network, device</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2b19d9e7-e0a9-4bed-af76-90b48915281c</guid>
      <title>Root Causes 73: Apple to Drop Support for Two-year SSL Certificates</title>
      <description><![CDATA[At the most recent Face-to-Face meeting of the CA/Browser Forum, Apple announced that as of September 1 it will distrust public TLS certificates issued with terms longer than thirteen months for all its technology products. Join our hosts as they discuss this change, its affect on the ecosystem, and what you need to do to prepare for one-year SSL certificates. 
]]></description>
      <pubDate>Fri, 13 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="19822302" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/dc707598-e220-41f3-8d90-4ad2a4f12a4a/group-item/1119969a-c9d1-4b2b-a541-f2b987e39fcd/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 73: Apple to Drop Support for Two-year SSL Certificates</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/71de83c3-c726-495a-9cd7-62ebcc2a83f4/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:38</itunes:duration>
      <itunes:summary>At the most recent Face-to-Face meeting of the CA/Browser Forum, Apple announced that as of September 1 it will distrust public TLS certificates issued with terms longer than thirteen months for all its technology products. Join our hosts as they discuss this change, its affect on the ecosystem, and what you need to do to prepare for one-year SSL certificates.</itunes:summary>
      <itunes:subtitle>At the most recent Face-to-Face meeting of the CA/Browser Forum, Apple announced that as of September 1 it will distrust public TLS certificates issued with terms longer than thirteen months for all its technology products. Join our hosts as they discuss this change, its affect on the ecosystem, and what you need to do to prepare for one-year SSL certificates.</itunes:subtitle>
      <itunes:keywords>tls, apple, pki, webpki, certificate lifecycle management, certificate lifespans, clm</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">921aab08-6c1b-4178-9c0c-80b44a391488</guid>
      <title>Root Causes 72: Future-proofing Your PKI</title>
      <description><![CDATA[Former CableLabs CIO and Kyrio President and General Manager Mitch Ashley joins our hosts to discuss how to set up a PKI system that will meet your needs for many years to come. Mitch is now CEO of Accelerated Strategies Group, a disruptive analyst firm focused on cybersecurity, devops and cloud. We discuss the differing attitudes, pain points, and processes of device manufacturers versus service providers. Mitch explains how the overall qualities of the ecosystem affect PKI, ensuring extensibility and auditability, and how to project your PKI needs into the future ten or twenty years from today. 
]]></description>
      <pubDate>Tue, 10 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="33100447" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/138a20ab-df96-46d0-8ad7-047f5dd08680/group-item/a19ed5bb-27a7-4a0f-a586-033df3af585c/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 72: Future-proofing Your PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/4db0fcc4-68df-4c34-8cf8-4d239b4b978c/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:28</itunes:duration>
      <itunes:summary>Former CableLabs CIO and Kyrio President and General Manager Mitch Ashley joins our hosts to discuss how to set up a PKI system that will meet your needs for many years to come. Mitch is now CEO of Accelerated Strategies Group, a disruptive analyst firm focused on cybersecurity, devops and cloud. We discuss the differing attitudes, pain points, and processes of device manufacturers versus service providers. Mitch explains how the overall qualities of the ecosystem affect PKI, ensuring extensibility and auditability, and how to project your PKI needs into the future ten or twenty years from today.</itunes:summary>
      <itunes:subtitle>Former CableLabs CIO and Kyrio President and General Manager Mitch Ashley joins our hosts to discuss how to set up a PKI system that will meet your needs for many years to come. Mitch is now CEO of Accelerated Strategies Group, a disruptive analyst firm focused on cybersecurity, devops and cloud. We discuss the differing attitudes, pain points, and processes of device manufacturers versus service providers. Mitch explains how the overall qualities of the ecosystem affect PKI, ensuring extensibility and auditability, and how to project your PKI needs into the future ten or twenty years from today.</itunes:subtitle>
      <itunes:keywords>tls, mitch ashley, x509, pki, cable labs</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9f858e45-9f3b-4164-adbf-1bf52b2863de</guid>
      <title>Root Causes 71: Short Lived DevOps Certificates</title>
      <description><![CDATA[Repeat guest and DevOps expert David Colon joins us again to discuss identity for microservices, including the use of very short-lived TLS certificates. David and our hosts explore the unique properties of PKI in these environments and describe how to find the optimal term for a container certificate. 
]]></description>
      <pubDate>Fri, 6 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="20173360" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/01f778ba-8508-48ab-be7c-4c4f721845b4/group-item/e2639424-f0dd-41c9-9dee-84df6dd6bc25/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 71: Short Lived DevOps Certificates</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/4f998ea8-4d9f-4026-aa8f-8faee5f8d074/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:00</itunes:duration>
      <itunes:summary>Repeat guest and DevOps expert David Colon joins us again to discuss identity for microservices, including the use of very short-lived TLS certificates. David and our hosts explore the unique properties of PKI in these environments and describe how to find the optimal term for a container certificate.</itunes:summary>
      <itunes:subtitle>Repeat guest and DevOps expert David Colon joins us again to discuss identity for microservices, including the use of very short-lived TLS certificates. David and our hosts explore the unique properties of PKI in these environments and describe how to find the optimal term for a container certificate.</itunes:subtitle>
      <itunes:keywords>tls, devops, x509, david colon, pki, certificate lifecycle management, certificate lifespans</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8010fd5-a836-470a-b071-10a6eacb45fc</guid>
      <title>Root Causes 70: Identity Is the New Perimeter</title>
      <description><![CDATA[Modern architectures and development processes have shattered the old concept of an IT perimeter for the enterprise. In this world, attaching strong identity to every device, user, and process is essential to security. In this episode our hosts describe this challenge and discuss the pros and cons of various identity schemes. 
]]></description>
      <pubDate>Wed, 4 Mar 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="26309000" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/e42bee7c-f96c-4a6e-829b-a91eb7093ca0/group-item/19877ecd-0a78-4a04-9b04-954b5ee9165d/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 70: Identity Is the New Perimeter</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9f459a66-29ad-4a0c-b7f6-9d5734804c2e/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:24</itunes:duration>
      <itunes:summary>Modern architectures and development processes have shattered the old concept of an IT perimeter for the enterprise. In this world, attaching strong identity to every device, user, and process is essential to security. In this episode our hosts describe this challenge and discuss the pros and cons of various identity schemes.</itunes:summary>
      <itunes:subtitle>Modern architectures and development processes have shattered the old concept of an IT perimeter for the enterprise. In this world, attaching strong identity to every device, user, and process is essential to security. In this episode our hosts describe this challenge and discuss the pros and cons of various identity schemes.</itunes:subtitle>
      <itunes:keywords>tls, x509, cybersecurity, pki, webpki, digital identities</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">abc35835-7b62-4d07-af05-b49a58da47cf</guid>
      <title>Root Causes 69: Fundamentals of DevOps and PKI</title>
      <description><![CDATA[In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI. We explore how PKI fits in with orchestration engines like Kubernetes and some of the practical considerations in securely using keys in such environments. 
]]></description>
      <pubDate>Fri, 28 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan, David Colon)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21288893" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/2193eff4-a4da-4107-9426-55abba910784/group-item/b36d500c-4f8e-4e7a-8502-f708061b8458/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 69: Fundamentals of DevOps and PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan, David Colon</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/22ae0fa6-1bd7-4335-a1ae-2b43322df884/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:10</itunes:duration>
      <itunes:summary>In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI. We explore how PKI fits in with orchestration engines like Kubernetes and some of the practical considerations in securely using keys in such environments.</itunes:summary>
      <itunes:subtitle>In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI. We explore how PKI fits in with orchestration engines like Kubernetes and some of the practical considerations in securely using keys in such environments.</itunes:subtitle>
      <itunes:keywords>tls, devops, x509, pki, webpki, certificate lifecycle management, certificate lifespans</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6ad7e15f-5e71-49b6-9102-5eebe87203cb</guid>
      <title>Root Causes 68: Why SHA-1 Is No Longer Secure</title>
      <description><![CDATA[SHA-1 was a cornerstone of the early secure web.  Now, 25 years later, this hashing function is no longer secure.  Join our hosts to hear the history of SHA-1, its common use cases, and the properties of an effective hashing function. Learn about collision attacks and why they matter. Find out the reasons SHA-1 is still in use and why it is no longer secure in today's computing world. 
]]></description>
      <pubDate>Mon, 24 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="30612754" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/1da0d3b6-429a-4879-8fc4-6f6f3b942245/group-item/73c86765-2707-467f-bef3-cb393af511f5/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 68: Why SHA-1 Is No Longer Secure</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/65e87a29-97f0-4b71-ac4f-22465b9ae8fc/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:53</itunes:duration>
      <itunes:summary>SHA-1 was a cornerstone of the early secure web.  Now, 25 years later, this hashing function is no longer secure.  Join our hosts to hear the history of SHA-1, its common use cases, and the properties of an effective hashing function. Learn about collision attacks and why they matter. Find out the reasons SHA-1 is still in use and why it is no longer secure in today&apos;s computing world.</itunes:summary>
      <itunes:subtitle>SHA-1 was a cornerstone of the early secure web.  Now, 25 years later, this hashing function is no longer secure.  Join our hosts to hear the history of SHA-1, its common use cases, and the properties of an effective hashing function. Learn about collision attacks and why they matter. Find out the reasons SHA-1 is still in use and why it is no longer secure in today&apos;s computing world.</itunes:subtitle>
      <itunes:keywords>tls, x509, pki, cryptography, cryptographic primitive, sha-1, hashing algorithm</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4fe3eff-7fd2-4be6-b6de-527c0a95d8ea</guid>
      <title>Root Causes 67: Definition of DevOps and DevSecOps</title>
      <description><![CDATA[Our hosts are joined by senior DevOps engineer David Colon to explore what DevOps means in today's enterprise. They cover diverse aspects of the DevOps phenomenon, including cultural implications, "configuration drift," definition of release velocity, and DevSecOps. Plus of course how DevSecOps intersects with PKI. 
]]></description>
      <pubDate>Fri, 21 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21305639" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/2dabc8d7-ddf7-4e42-b638-e2daf4b317b4/group-item/bc439ade-f65e-443e-bfa0-4438397e4c25/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 67: Definition of DevOps and DevSecOps</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/770e89e4-3615-4167-8b15-28d8f1c7e61c/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:11</itunes:duration>
      <itunes:summary>Our hosts are joined by senior DevOps engineer David Colon to explore what DevOps means in today&apos;s enterprise. They cover diverse aspects of the DevOps phenomenon, including cultural implications, &quot;configuration drift,&quot; definition of release velocity, and DevSecOps. Plus of course how DevSecOps intersects with PKI.</itunes:summary>
      <itunes:subtitle>Our hosts are joined by senior DevOps engineer David Colon to explore what DevOps means in today&apos;s enterprise. They cover diverse aspects of the DevOps phenomenon, including cultural implications, &quot;configuration drift,&quot; definition of release velocity, and DevSecOps. Plus of course how DevSecOps intersects with PKI.</itunes:subtitle>
      <itunes:keywords>tls, devops, x509, pki, certificate lifecycle management, certificate lifespans, devsecops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e2a3d59c-eec3-4229-8553-2f2a3f529dbe</guid>
      <title>Root Causes 66: Functional Versus Homomorphic Encryption</title>
      <description><![CDATA[Traditionally, file encryption is an all-or-nothing affair where data cannot be gleaned from the encrypted file without fully decrypting its contents. A new brand of cryptography called homomorphic encryption makes it possible for specific types of data to be read from a file while the rest of it remains encrypted. Join our hosts as they explain this new technology approach and its possible implications and use cases. 
]]></description>
      <pubDate>Tue, 18 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="15078437" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/5c7bd8ba-13e8-49d4-85c5-a0580ec5ec84/group-item/b115196c-a970-4fbc-b68a-c7ca8b30badd/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 66: Functional Versus Homomorphic Encryption</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/367470e7-c7a2-4b61-90c3-b3bbb5afab37/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:42</itunes:duration>
      <itunes:summary>Traditionally, file encryption is an all-or-nothing affair where data cannot be gleaned from the encrypted file without fully decrypting its contents. A new brand of cryptography called homomorphic encryption makes it possible for specific types of data to be read from a file while the rest of it remains encrypted. Join our hosts as they explain this new technology approach and its possible implications and use cases.</itunes:summary>
      <itunes:subtitle>Traditionally, file encryption is an all-or-nothing affair where data cannot be gleaned from the encrypted file without fully decrypting its contents. A new brand of cryptography called homomorphic encryption makes it possible for specific types of data to be read from a file while the rest of it remains encrypted. Join our hosts as they explain this new technology approach and its possible implications and use cases.</itunes:subtitle>
      <itunes:keywords>homomorphic, pki, cryptography, encryption</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">11111448-1759-44fe-8724-d5c53e4777ad</guid>
      <title>Root Causes 65: Quantum Key Distribution</title>
      <description><![CDATA[Quantum key distribution is a new technology that uses the principles of quantum physics to generate and distribute truly random keys for encrypted communication. Join us as we explain how quantum key distribution works, why it is not the same as quantum safe cryptography, and which cases it may be useful for. 
]]></description>
      <pubDate>Mon, 10 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17294039" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/824efe39-6569-4c33-91ff-35eb20cec0b9/group-item/1905bee0-99a6-4c51-90ad-ffe7c54733aa/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 65: Quantum Key Distribution</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/62b91430-ead3-4547-a8f1-493beaf18aef/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:00</itunes:duration>
      <itunes:summary>Quantum key distribution is a new technology that uses the principles of quantum physics to generate and distribute truly random keys for encrypted communication. Join us as we explain how quantum key distribution works, why it is not the same as quantum safe cryptography, and which cases it may be useful for.</itunes:summary>
      <itunes:subtitle>Quantum key distribution is a new technology that uses the principles of quantum physics to generate and distribute truly random keys for encrypted communication. Join us as we explain how quantum key distribution works, why it is not the same as quantum safe cryptography, and which cases it may be useful for.</itunes:subtitle>
      <itunes:keywords>quantum, pki, qkd, quantum key distribution</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d5c905f7-1c25-4eb4-b509-029556c15527</guid>
      <title>Root Causes 64: What Is Digital Identity?</title>
      <description><![CDATA[The phrase "identity is the new perimeter" has gained in use of late, reflecting the reality that today's modern enterprise architecture is a mix of traditional and cloud, owned and rented and BYOD, all together in a complex mix. Under those circumstances identity is key to determine which digital entities have which permissions.  But what do we mean when we say identity?  Join our hosts as they explain the concepts behind digital identity, how they compare to our offline ideas around identity, and how these ideas shape computer security. 
]]></description>
      <pubDate>Tue, 4 Feb 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="28552187" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/e66095c5-0678-420e-b0d1-cf3e0ddea4af/group-item/eb838b1e-f0d6-4689-91d5-3fb01f7c700d/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 64: What Is Digital Identity?</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/f50f854c-bfb4-4746-9af9-be8a36726744/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:44</itunes:duration>
      <itunes:summary>The phrase &quot;identity is the new perimeter&quot; has gained in use of late, reflecting the reality that today&apos;s modern enterprise architecture is a mix of traditional and cloud, owned and rented and BYOD, all together in a complex mix. Under those circumstances identity is key to determine which digital entities have which permissions.  But what do we mean when we say identity?  Join our hosts as they explain the concepts behind digital identity, how they compare to our offline ideas around identity, and how these ideas shape computer security.</itunes:summary>
      <itunes:subtitle>The phrase &quot;identity is the new perimeter&quot; has gained in use of late, reflecting the reality that today&apos;s modern enterprise architecture is a mix of traditional and cloud, owned and rented and BYOD, all together in a complex mix. Under those circumstances identity is key to determine which digital entities have which permissions.  But what do we mean when we say identity?  Join our hosts as they explain the concepts behind digital identity, how they compare to our offline ideas around identity, and how these ideas shape computer security.</itunes:subtitle>
      <itunes:keywords>tls, x509, identity, pki, identity is the new perimeter</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2c35d72c-f115-4d2d-8ef5-44fec3c43047</guid>
      <title>Root Causes 63: What Is CAA?</title>
      <description><![CDATA[CAA, which stands for CA Authentication, is the capability for the domain name owner to specify in DNS which CAs are allowed to issue SSL certificates for a specific domain. Join us to learn more about CAA, including how it works and its potential benefits to businesses. 
]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="9520834" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/430c7b9c-f438-4bad-91aa-82be07300c52/group-item/0902f285-af61-4d88-b8a9-36d0ac601fb7/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 63: What Is CAA?</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/096654bc-f9e6-49dc-95e9-bd592225bbb6/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:55</itunes:duration>
      <itunes:summary>CAA, which stands for CA Authentication, is the capability for the domain name owner to specify in DNS which CAs are allowed to issue SSL certificates for a specific domain. Join us to learn more about CAA, including how it works and its potential benefits to businesses.</itunes:summary>
      <itunes:subtitle>CAA, which stands for CA Authentication, is the capability for the domain name owner to specify in DNS which CAs are allowed to issue SSL certificates for a specific domain. Join us to learn more about CAA, including how it works and its potential benefits to businesses.</itunes:subtitle>
      <itunes:keywords>digital certificates, x509, pki, webpki, caa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0c9af701-0c22-4dff-afbb-3ac23699a9ee</guid>
      <title>Root Causes 62: Windows CryptoAPI Spoofing Vulnerability Explained</title>
      <description><![CDATA[On January 14 Microsoft announced a sweeping vulnerability that makes it possible to defeat the authentication of Elliptic Curve Cryptography (ECC) on Windows 10 and Windows Server systems, making it possible to create fake certificates on trusted roots that will fool these systems. Join our hosts and guest Nick France, CTO of SSL at Sectigo, as we explain this vulnerability, how it could be used in exploits, and what must be done to address it. 
]]></description>
      <pubDate>Wed, 22 Jan 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17577833" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/abf9ed3c-9902-4991-a008-c2277b3ebf8e/group-item/3926d85c-52f0-4dda-9d09-f3697aaddfdd/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 62: Windows CryptoAPI Spoofing Vulnerability Explained</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/942c0e99-c953-4d71-ab65-87fa223d2dba/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:18</itunes:duration>
      <itunes:summary>On January 14 Microsoft announced a sweeping vulnerability that makes it possible to defeat the authentication of Elliptic Curve Cryptography (ECC) on Windows 10 and Windows Server systems, making it possible to create fake certificates on trusted roots that will fool these systems. Join our hosts and guest Nick France, CTO of SSL at Sectigo, as we explain this vulnerability, how it could be used in exploits, and what must be done to address it.</itunes:summary>
      <itunes:subtitle>On January 14 Microsoft announced a sweeping vulnerability that makes it possible to defeat the authentication of Elliptic Curve Cryptography (ECC) on Windows 10 and Windows Server systems, making it possible to create fake certificates on trusted roots that will fool these systems. Join our hosts and guest Nick France, CTO of SSL at Sectigo, as we explain this vulnerability, how it could be used in exploits, and what must be done to address it.</itunes:subtitle>
      <itunes:keywords>elliptic curve, pki, webpki, cryptography, microsoft</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5fadf7c0-9dfb-4ffd-afdc-25a95636d386</guid>
      <title>Root Causes 61: Anatomy of a Cryptocurrency</title>
      <description><![CDATA[In our ongoing series about blockchain, we explore the technology, process, and ecosystem needs for a successful cryptocurrency. Join our hosts along with expert guest Alan Grau as we discuss the technology and ecosystem specifics of cryptocurrencies, including blockchain and PKI. 
]]></description>
      <pubDate>Fri, 10 Jan 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="30188915" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/c78ab5c8-fc61-44c2-9d9e-6fa9559204dd/group-item/1130b153-8637-48f0-b961-7263385428ab/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 61: Anatomy of a Cryptocurrency</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/062e951a-d55e-44bd-98a7-da03ab970092/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:26</itunes:duration>
      <itunes:summary>In our ongoing series about blockchain, we explore the technology, process, and ecosystem needs for a successful cryptocurrency. Join our hosts along with expert guest Alan Grau as we discuss the technology and ecosystem specifics of cryptocurrencies, including blockchain and PKI.</itunes:summary>
      <itunes:subtitle>In our ongoing series about blockchain, we explore the technology, process, and ecosystem needs for a successful cryptocurrency. Join our hosts along with expert guest Alan Grau as we discuss the technology and ecosystem specifics of cryptocurrencies, including blockchain and PKI.</itunes:subtitle>
      <itunes:keywords>pki, crypto, crypto wallet, cryptocurrency</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0678187b-1554-4a3c-a25d-97b26647a63f</guid>
      <title>Root Causes 60: Fundamentals of Blockchain</title>
      <description><![CDATA[Widely understood to be the technology behind popular crypto currencies, blockchain has become a household word. But what it blockchain really, and how does it work? Join our hosts and returning guest Alan Grau as they explain how blockchain functions, its strengths and weaknesses, and some of the other potential applications for this technology. 
]]></description>
      <pubDate>Mon, 6 Jan 2020 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="20682434" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/1af21ec4-fe99-456b-a2b0-3ef43e8698c8/group-item/a3b7af74-54ec-4848-b018-35cea782f82b/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 60: Fundamentals of Blockchain</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/fb161048-0b96-4006-869a-7def681feb73/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:32</itunes:duration>
      <itunes:summary>Widely understood to be the technology behind popular crypto currencies, blockchain has become a household word. But what it blockchain really, and how does it work? Join our hosts and returning guest Alan Grau as they explain how blockchain functions, its strengths and weaknesses, and some of the other potential applications for this technology.</itunes:summary>
      <itunes:subtitle>Widely understood to be the technology behind popular crypto currencies, blockchain has become a household word. But what it blockchain really, and how does it work? Join our hosts and returning guest Alan Grau as they explain how blockchain functions, its strengths and weaknesses, and some of the other potential applications for this technology.</itunes:subtitle>
      <itunes:keywords>blockchain, pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b2008753-0d63-4ad7-9d46-a1876d5a1a59</guid>
      <title>Root Causes 59: What Is Certificate Transparency?</title>
      <description><![CDATA[Certificate Transparency (CT) is a recent and important development in  the world of SSL certificates. Popular browsers require trusted CAs to log all SSL certificates to publicly available CT Logs. Join our hosts to find out how various parties are using CT Logs to learn about CA behavior and SSL usage patterns and to improve the overall quality of public trust. 
]]></description>
      <pubDate>Mon, 30 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Tim Callan, Jason Soroko)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="20582124" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/eeea288f-ab27-43b3-b6f5-3359376052dd/group-item/659c191b-3a99-4751-a5dd-c61e36856426/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 59: What Is Certificate Transparency?</itunes:title>
      <itunes:author>Tim Callan, Jason Soroko</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/914aa619-8e18-436c-8cab-bbe0804f55e3/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:26</itunes:duration>
      <itunes:summary>Certificate Transparency (CT) is a recent and important development in  the world of SSL certificates. Popular browsers require trusted CAs to log all SSL certificates to publicly available CT Logs. Join our hosts to find out how various parties are using CT Logs to learn about CA behavior and SSL usage patterns and to improve the overall quality of public trust.</itunes:summary>
      <itunes:subtitle>Certificate Transparency (CT) is a recent and important development in  the world of SSL certificates. Popular browsers require trusted CAs to log all SSL certificates to publicly available CT Logs. Join our hosts to find out how various parties are using CT Logs to learn about CA behavior and SSL usage patterns and to improve the overall quality of public trust.</itunes:subtitle>
      <itunes:keywords>tls, x509, certificate transparency, pki, webpki, ct logs, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">acb83dc0-dff3-4766-9a55-5a76972d5214</guid>
      <title>Root Causes 58: 2019 Lookback - One Year of Podcasting</title>
      <description><![CDATA[Nearly a year ago our hosts launched Root Causes to provide a forum for discussion of the issues surrounding the critically important PKI technology. Now at the end of 2019 we discuss how this podcast has taken shape, how that compares to our original expectations, and what we are looking forward to in 2020. 
]]></description>
      <pubDate>Mon, 16 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13437947" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/722d27f3-41a5-4251-8b4b-0b3b8397c661/group-item/daf7cd70-99b4-41eb-86f9-ab0bfd7e4b0f/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 58: 2019 Lookback - One Year of Podcasting</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/4359409f-0681-45e9-98e1-a3a99dcd712a/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:59</itunes:duration>
      <itunes:summary>Nearly a year ago our hosts launched Root Causes to provide a forum for discussion of the issues surrounding the critically important PKI technology. Now at the end of 2019 we discuss how this podcast has taken shape, how that compares to our original expectations, and what we are looking forward to in 2020.</itunes:summary>
      <itunes:subtitle>Nearly a year ago our hosts launched Root Causes to provide a forum for discussion of the issues surrounding the critically important PKI technology. Now at the end of 2019 we discuss how this podcast has taken shape, how that compares to our original expectations, and what we are looking forward to in 2020.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1844bb63-5c01-4612-8bec-737a3a1a61b2</guid>
      <title>Root Causes 57: Quantum Random Number Generation</title>
      <description><![CDATA[Random number generation is an essential part of successful cryptography. Quantum computers offer to improve this niche technology industry. Join our hosts to learn what quantum random number generators (qRNGs) are, how they stand to improve cryptography and other computing functions, and how they tie into post-quantum cryptography (or don't). 
]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18116582" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/5da4af85-2575-4e7c-9d66-ca59b1abb250/group-item/748da495-a48b-42c2-bc3b-66cfdd64735a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 57: Quantum Random Number Generation</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/f300474e-36cf-4977-bcbd-71b079f773b9/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:52</itunes:duration>
      <itunes:summary>Random number generation is an essential part of successful cryptography. Quantum computers offer to improve this niche technology industry. Join our hosts to learn what quantum random number generators (qRNGs) are, how they stand to improve cryptography and other computing functions, and how they tie into post-quantum cryptography (or don&apos;t).</itunes:summary>
      <itunes:subtitle>Random number generation is an essential part of successful cryptography. Quantum computers offer to improve this niche technology industry. Join our hosts to learn what quantum random number generators (qRNGs) are, how they stand to improve cryptography and other computing functions, and how they tie into post-quantum cryptography (or don&apos;t).</itunes:subtitle>
      <itunes:keywords>tls, quantum, qrng, pki, webpki, quantum random number generation, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">310d9889-ff4b-40d3-86a8-ae6e96f9c3ae</guid>
      <title>Root Causes 56: 2019 Lookback - Evolving Cryptography</title>
      <description><![CDATA[2019 saw important changes in the world's cryptographic standards, including changes in browser treatment of SSL certificates, the removal of a public CA from trusted root stores, widespread serial number entropy problems across many CAs, and progress in building quantum-resistant PKI. Join our hosts as they detail these going-on and others and talk about what 2020 may hold in terms of evolving cryptography. 
]]></description>
      <pubDate>Mon, 9 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="22241840" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7902a3b1-bc76-4b93-a7e3-4d6952acdf76/group-item/57deb98d-8000-4cd8-9c67-20694fef2634/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 56: 2019 Lookback - Evolving Cryptography</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/14a32088-6bcd-468f-bd16-b99e8b997846/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:10</itunes:duration>
      <itunes:summary>2019 saw important changes in the world&apos;s cryptographic standards, including changes in browser treatment of SSL certificates, the removal of a public CA from trusted root stores, widespread serial number entropy problems across many CAs, and progress in building quantum-resistant PKI. Join our hosts as they detail these going-on and others and talk about what 2020 may hold in terms of evolving cryptography.</itunes:summary>
      <itunes:subtitle>2019 saw important changes in the world&apos;s cryptographic standards, including changes in browser treatment of SSL certificates, the removal of a public CA from trusted root stores, widespread serial number entropy problems across many CAs, and progress in building quantum-resistant PKI. Join our hosts as they detail these going-on and others and talk about what 2020 may hold in terms of evolving cryptography.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">789b76f8-97ec-4413-bdc0-102330f1270c</guid>
      <title>Root Causes 55: California&apos;s New IoT Security Law</title>
      <description><![CDATA[California Senate Bill 327 (SB-327) goes into effect January 1, 2020. This groundbreaking ordinance requires basic security measures for devices deployed in California. Join us to learn what SB-327 requires from device manufacturers, which threats it protects against, and how this ordinance is leading the way toward stronger IoT security practices. 
]]></description>
      <pubDate>Thu, 5 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21389203" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/d2a7b90f-803f-4469-959d-b753cd83a3e4/group-item/3c2cb405-7bde-491d-bd78-81b93bf42bad/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 55: California&apos;s New IoT Security Law</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/d6d441c8-fc71-4512-ae20-d17c9bc6acdc/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:16</itunes:duration>
      <itunes:summary>California Senate Bill 327 (SB-327) goes into effect January 1, 2020. This groundbreaking ordinance requires basic security measures for devices deployed in California. Join us to learn what SB-327 requires from device manufacturers, which threats it protects against, and how this ordinance is leading the way toward stronger IoT security practices.</itunes:summary>
      <itunes:subtitle>California Senate Bill 327 (SB-327) goes into effect January 1, 2020. This groundbreaking ordinance requires basic security measures for devices deployed in California. Join us to learn what SB-327 requires from device manufacturers, which threats it protects against, and how this ordinance is leading the way toward stronger IoT security practices.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, iot, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">161934f7-19b2-4722-8e96-6156fe04103b</guid>
      <title>Root Causes 54: 2019 Lookback - Infrastructure and IoT Security</title>
      <description><![CDATA[2019 was a highly eventful year for infrastructure and IoT security. The year saw the emergence of wholesale attacks on the world's energy infrastructure, an epidemic of ransomware incidents against municipalities, heightened attention to automotive identity and security, and a number of legislative measures to try to secure this whole set of systems and devices. Join our hosts as they talk about the trends in IoT and infrastructure security in 2019 and where these trends may go in 2020. 
]]></description>
      <pubDate>Tue, 3 Dec 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="23595609" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/5d533020-556e-472c-ba68-10b021644ae4/group-item/7312fabc-744f-421a-bc3e-2ce677780a82/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 54: 2019 Lookback - Infrastructure and IoT Security</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ed70847f-cf23-48e3-b5c6-e7dbec4ad3c0/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:34</itunes:duration>
      <itunes:summary>2019 was a highly eventful year for infrastructure and IoT security. The year saw the emergence of wholesale attacks on the world&apos;s energy infrastructure, an epidemic of ransomware incidents against municipalities, heightened attention to automotive identity and security, and a number of legislative measures to try to secure this whole set of systems and devices. Join our hosts as they talk about the trends in IoT and infrastructure security in 2019 and where these trends may go in 2020.</itunes:summary>
      <itunes:subtitle>2019 was a highly eventful year for infrastructure and IoT security. The year saw the emergence of wholesale attacks on the world&apos;s energy infrastructure, an epidemic of ransomware incidents against municipalities, heightened attention to automotive identity and security, and a number of legislative measures to try to secure this whole set of systems and devices. Join our hosts as they talk about the trends in IoT and infrastructure security in 2019 and where these trends may go in 2020.</itunes:subtitle>
      <itunes:keywords>tls, webpki, iotpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5003a248-5786-438f-98c7-12436a7e343f</guid>
      <title>Root Causes 53: 2019 Lookback - Governments Try to Control PKI</title>
      <description><![CDATA[2019 has been an eventful year for PKI. In this episode, first in a series of four lookbacks at the year, our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019. 
]]></description>
      <pubDate>Mon, 25 Nov 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18161304" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/3cfbe4d9-a952-4b7c-9675-53592ed00f02/group-item/041323de-3a72-4d5e-a4f5-2ecd0e0b5773/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 53: 2019 Lookback - Governments Try to Control PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/c125f632-334a-48fb-8aa2-2006b025bef5/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:55</itunes:duration>
      <itunes:summary>2019 has been an eventful year for PKI. In this episode, first in a series of four lookbacks at the year, our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.</itunes:summary>
      <itunes:subtitle>2019 has been an eventful year for PKI. In this episode, first in a series of four lookbacks at the year, our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.</itunes:subtitle>
      <itunes:keywords>tls, government, pki, webpki, government vs encryption, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d26a65c5-2872-4575-ab42-3a584b3c26d4</guid>
      <title>Root Causes 52: New TLS Certificate Incident Research</title>
      <description><![CDATA[New research out of Indiana University Bloomington reviews nearly 400 "incidents" with public SSL certificates over the course of more than a decade. Join us as we go through the main findings from this piece of original research, including methodology, incident types and causes, and rogue certificates. 
]]></description>
      <pubDate>Fri, 22 Nov 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="23158006" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/f69faa27-ccf8-493d-a811-3330785465d6/group-item/4f966b4d-aac1-49bb-b518-4c13261c26bb/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 52: New TLS Certificate Incident Research</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/eaec53ee-da55-40c9-92c8-aefb9293b93b/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:07</itunes:duration>
      <itunes:summary>New research out of Indiana University Bloomington reviews nearly 400 &quot;incidents&quot; with public SSL certificates over the course of more than a decade. Join us as we go through the main findings from this piece of original research, including methodology, incident types and causes, and rogue certificates.</itunes:summary>
      <itunes:subtitle>New research out of Indiana University Bloomington reviews nearly 400 &quot;incidents&quot; with public SSL certificates over the course of more than a decade. Join us as we go through the main findings from this piece of original research, including methodology, incident types and causes, and rogue certificates.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cd51e97c-912e-4ca1-a378-7d90ac613b4d</guid>
      <title>Root Causes 51: Blockchain vs. PKI</title>
      <description><![CDATA[In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary? Join us this episode as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each. 
]]></description>
      <pubDate>Tue, 19 Nov 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="28377480" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/28e8bb6f-b3b2-4668-a150-387287f8ad4c/group-item/d2404e30-84f3-4256-94b8-870395d7edba/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 51: Blockchain vs. PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/2959716d-ee27-4e13-8186-d6e34fac0685/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:33</itunes:duration>
      <itunes:summary>In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary? Join us this episode as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.</itunes:summary>
      <itunes:subtitle>In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary? Join us this episode as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.</itunes:subtitle>
      <itunes:keywords>tls, blockchain, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ad62046-b7b5-43dc-9c70-9c08777df9a8</guid>
      <title>Root Causes 50: Energy Infrastructure Cyber Attacks</title>
      <description><![CDATA[Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join our hosts as we discuss recent attacks on power plants, why these attacks persist, and possible responses. 
]]></description>
      <pubDate>Fri, 8 Nov 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21554297" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/d92fbb3a-a864-4c9f-9c6f-2f46bbe186ba/group-item/fc054463-8ed5-4bb9-af4f-b7a2b1110141/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 50: Energy Infrastructure Cyber Attacks</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/c3e00c67-c777-4e6b-b3b3-8f8519ef5a94/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:27</itunes:duration>
      <itunes:summary>Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join our hosts as we discuss recent attacks on power plants, why these attacks persist, and possible responses.</itunes:summary>
      <itunes:subtitle>Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join our hosts as we discuss recent attacks on power plants, why these attacks persist, and possible responses.</itunes:subtitle>
      <itunes:keywords>tls, critical infrastructure, pki, webpki, cryptography, iot, encryption, energy, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e80a9d26-a4d6-4a59-a4e8-c7b578e9b305</guid>
      <title>Root Causes 49: California Consumer Privacy Act</title>
      <description><![CDATA[The California Consumer Privacy Act (CCPA) has been described by some as California's GDPR. This act provides broad protections to consumers in California, and businesses must comply starting January 1, 2020. Join us as we discuss this act, what protections it provides, and what businesses must do to comply. 
]]></description>
      <pubDate>Wed, 6 Nov 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13615998" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/72fee5a6-254c-432b-8a70-0d30af80c86c/group-item/15a6bcab-37d4-4528-82da-54c8692fd5f4/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 49: California Consumer Privacy Act</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/1aa2ec41-8840-4683-9d29-31899cb2699c/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:10</itunes:duration>
      <itunes:summary>The California Consumer Privacy Act (CCPA) has been described by some as California&apos;s GDPR. This act provides broad protections to consumers in California, and businesses must comply starting January 1, 2020. Join us as we discuss this act, what protections it provides, and what businesses must do to comply.</itunes:summary>
      <itunes:subtitle>The California Consumer Privacy Act (CCPA) has been described by some as California&apos;s GDPR. This act provides broad protections to consumers in California, and businesses must comply starting January 1, 2020. Join us as we discuss this act, what protections it provides, and what businesses must do to comply.</itunes:subtitle>
      <itunes:keywords>privacy, ccpa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">adf704cb-72c3-4624-a534-b0544ef61084</guid>
      <title>Root Causes 48: Weaknesses in MFA Authentication</title>
      <description><![CDATA[A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them. 
]]></description>
      <pubDate>Thu, 31 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14967260" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/dd81122c-0dae-4a41-8a33-c84896142982/group-item/3e387aec-e7ac-4996-a09b-29c98d62983d/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 48: Weaknesses in MFA Authentication</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/286634bd-09b9-40ba-acca-9fa244e8d770/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:35</itunes:duration>
      <itunes:summary>A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.</itunes:summary>
      <itunes:subtitle>A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.</itunes:subtitle>
      <itunes:keywords>cybersecurity, mfa, multi factor authentication</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fffdd081-f3e0-44dd-8e51-5298b37e1029</guid>
      <title>Root Causes 47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT</title>
      <description><![CDATA[Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years.  But what do we do about IoT devices, which may lack updating mechanisms and live in the field for decades with little available access. Our hosts are joined by repeat guest Alan Grau as we explore how IoT has specific requirements and challenges for quantum resistant crypto. 
]]></description>
      <pubDate>Fri, 25 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16925817" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/a7ae44b0-a404-4e12-b3ea-5e06037a948a/group-item/7c43cbee-6dd2-4a77-9ed1-69e3b7d921b0/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/e4835a13-0048-44d1-842e-bd555b00786e/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:37</itunes:duration>
      <itunes:summary>Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years.  But what do we do about IoT devices, which may lack updating mechanisms and live in the field for decades with little available access. Our hosts are joined by repeat guest Alan Grau as we explore how IoT has specific requirements and challenges for quantum resistant crypto.</itunes:summary>
      <itunes:subtitle>Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years.  But what do we do about IoT devices, which may lack updating mechanisms and live in the field for decades with little available access. Our hosts are joined by repeat guest Alan Grau as we explore how IoT has specific requirements and challenges for quantum resistant crypto.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a7e4ab81-0e09-4122-a76d-a2b92d3a7177</guid>
      <title>Root Causes 46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks</title>
      <description><![CDATA[In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system. To learn more about this new development, join our hosts as they explain how this attack works, its significance, and where the criminals may go from here. 
]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13088115" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/b52b7318-789d-4e2c-b893-691706e9af33/group-item/2ac0ce5d-58a7-43a0-be0f-b30d9f4990f7/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 46: Criminals Are Patching Browsers for TLS Fingerprinting Attacks</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/e41c0c7e-0728-42d5-a409-233d27c1d156/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:37</itunes:duration>
      <itunes:summary>In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system. To learn more about this new development, join our hosts as they explain how this attack works, its significance, and where the criminals may go from here.</itunes:summary>
      <itunes:subtitle>In a new variant on a known attack, a Russian Advanced Persistent Threat has begun applying patches to Chrome and Firefox to enable TLS fingerprinting even after the malware is removed from a system. To learn more about this new development, join our hosts as they explain how this attack works, its significance, and where the criminals may go from here.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a968ede9-aabd-4e15-8517-1467298971ff</guid>
      <title>Root Causes 45: What Is the CA/Browser Forum?</title>
      <description><![CDATA[SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority? If you've ever wondered about questions like these join our hosts as they describe the origins of the CA/Browser Forum and how it operates. 
]]></description>
      <pubDate>Fri, 18 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="22315417" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/0136e1ea-a2c2-484d-9ea8-9f0e84aedadd/group-item/30903415-2eb4-42e4-a7c9-0088058a21a5/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 45: What Is the CA/Browser Forum?</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/31d02d9b-c27d-48cf-8465-601487897e34/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:14</itunes:duration>
      <itunes:summary>SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority? If you&apos;ve ever wondered about questions like these join our hosts as they describe the origins of the CA/Browser Forum and how it operates.</itunes:summary>
      <itunes:subtitle>SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority? If you&apos;ve ever wondered about questions like these join our hosts as they describe the origins of the CA/Browser Forum and how it operates.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f67caf5-f703-44aa-868b-ca332afa1c5b</guid>
      <title>Root Causes 44: Automotive Device Security</title>
      <description><![CDATA[The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven, new challenges that will come with increasingly advanced capabilities, and what manufacturers can do to protect drivers from harm. 
]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16452704" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/709dfa75-88cb-4184-8478-3cf58416a362/group-item/1f721eb2-b385-4922-b8ed-648db8f7a8d2/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 44: Automotive Device Security</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/7873ef13-49ce-4792-a209-031f91e1c1b0/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:08</itunes:duration>
      <itunes:summary>The automobile is undoubtedly among today&apos;s most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven, new challenges that will come with increasingly advanced capabilities, and what manufacturers can do to protect drivers from harm.</itunes:summary>
      <itunes:subtitle>The automobile is undoubtedly among today&apos;s most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven, new challenges that will come with increasingly advanced capabilities, and what manufacturers can do to protect drivers from harm.</itunes:subtitle>
      <itunes:keywords>tls, automobile, pki, webpki, cryptography, cars, encryption, automotive, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb48da1c-7324-4cbf-8a43-46d2e3a17008</guid>
      <title>Root Causes 43: Quantum Apocalypse - More on Mosca&apos;s Inequality</title>
      <description><![CDATA[In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse. In this episode our hosts embark on a nuanced exploration of the factors influencing this calculation and test whether popular estimates are credible. 
]]></description>
      <pubDate>Fri, 11 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21577284" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7d7e189b-9e4f-472f-93dd-130d46d876ee/group-item/c42f6fa2-f72f-4a9d-be5e-922da01c9500/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 43: Quantum Apocalypse - More on Mosca&apos;s Inequality</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/16d0ec44-72e7-4a5b-823b-dc244f0bc88d/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:28</itunes:duration>
      <itunes:summary>In episode 35 our hosts explained Mosca&apos;s Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse. In this episode our hosts embark on a nuanced exploration of the factors influencing this calculation and test whether popular estimates are credible.</itunes:summary>
      <itunes:subtitle>In episode 35 our hosts explained Mosca&apos;s Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse. In this episode our hosts embark on a nuanced exploration of the factors influencing this calculation and test whether popular estimates are credible.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9c904dee-43dd-4f82-9c7a-b6036ec2c360</guid>
      <title>Root Causes 42: Anatomy of a Botnet</title>
      <description><![CDATA[We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau (VP of IoT and Embedded Security, Sectigo) joins us to help dissect today's botnets. 
]]></description>
      <pubDate>Tue, 8 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="23736044" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/bfe1594e-2211-4bf0-819d-85c03d9416cd/group-item/893d2dfc-4628-4b32-bb46-64f2c15b1bc1/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 42: Anatomy of a Botnet</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/536d0f0c-1476-4225-a41a-c76ad3900333/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:43</itunes:duration>
      <itunes:summary>We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau (VP of IoT and Embedded Security, Sectigo) joins us to help dissect today&apos;s botnets.</itunes:summary>
      <itunes:subtitle>We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau (VP of IoT and Embedded Security, Sectigo) joins us to help dissect today&apos;s botnets.</itunes:subtitle>
      <itunes:keywords>botnet, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59c5627b-e8ac-4819-8c19-a3c6c1f04da5</guid>
      <title>Root Causes 41: What Is Blockchain&apos;s Killer App?</title>
      <description><![CDATA[Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. While the two approaches accomplish some related goals, they are very different in how they work and ultimately accomplish different ends. Join us as we explain what blockchain actually does and how it compares to PKI, including some examples of use cases that are appropriate for each of these technologies. 
]]></description>
      <pubDate>Thu, 3 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14051511" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/d13a7ea5-9b9f-4472-9b15-59a6108ec1ea/group-item/9dafeb1d-6095-4018-b8a8-bf45ed62eb7a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 41: What Is Blockchain&apos;s Killer App?</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/637020ea-cf59-4851-8aef-89388397252e/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:38</itunes:duration>
      <itunes:summary>Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. While the two approaches accomplish some related goals, they are very different in how they work and ultimately accomplish different ends. Join us as we explain what blockchain actually does and how it compares to PKI, including some examples of use cases that are appropriate for each of these technologies.</itunes:summary>
      <itunes:subtitle>Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. While the two approaches accomplish some related goals, they are very different in how they work and ultimately accomplish different ends. Join us as we explain what blockchain actually does and how it compares to PKI, including some examples of use cases that are appropriate for each of these technologies.</itunes:subtitle>
      <itunes:keywords>tls, blockchain, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1d7e6cc5-9ea6-4d94-831e-f129724609ee</guid>
      <title>Root Causes 40: The Reports of RSA&apos;s Death Are Greatly Exaggerated</title>
      <description><![CDATA[Recently at Black Hat and on public YouTube videos security newcomer Crown Sterling has claimed to factor the RSA algorithm. It turns out the breathlessly discussed feats were already accomplished as early as 1999.  Join our hosts as they debunk this fundamentally misleading rumor and discuss the reality of RSA encryption today. 
]]></description>
      <pubDate>Tue, 1 Oct 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="8796946" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/9da0ffe9-1fb3-42b5-8193-bf3afd31ac30/group-item/bd947c73-559b-4735-829a-d42a21ba6396/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 40: The Reports of RSA&apos;s Death Are Greatly Exaggerated</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/33b347d8-34fc-4a8b-aec1-9c5fe26c0119/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:09</itunes:duration>
      <itunes:summary>Recently at Black Hat and on public YouTube videos security newcomer Crown Sterling has claimed to factor the RSA algorithm. It turns out the breathlessly discussed feats were already accomplished as early as 1999.  Join our hosts as they debunk this fundamentally misleading rumor and discuss the reality of RSA encryption today.</itunes:summary>
      <itunes:subtitle>Recently at Black Hat and on public YouTube videos security newcomer Crown Sterling has claimed to factor the RSA algorithm. It turns out the breathlessly discussed feats were already accomplished as early as 1999.  Join our hosts as they debunk this fundamentally misleading rumor and discuss the reality of RSA encryption today.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, rsa, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56a07776-a7da-4da0-b533-68994a576797</guid>
      <title>Root Causes 39: New University Research on Phishing and Certificates</title>
      <description><![CDATA[The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a large, German technical university, investigates the patterns behind this certificate usage. Join our hosts as we dig into the details of these findings to learn specifically which certificate types are more or less likely to appear on phishing sites - and some thoughts on why. 
]]></description>
      <pubDate>Thu, 26 Sep 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="19238803" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/e9c77e7d-bd44-4a32-9bfe-393c048159cc/group-item/95207931-292d-44ed-b8dd-1de5aa20e91b/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 39: New University Research on Phishing and Certificates</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9f79f560-b3b6-42b1-acc5-e8c9f52b6d77/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:02</itunes:duration>
      <itunes:summary>The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a large, German technical university, investigates the patterns behind this certificate usage. Join our hosts as we dig into the details of these findings to learn specifically which certificate types are more or less likely to appear on phishing sites - and some thoughts on why.</itunes:summary>
      <itunes:subtitle>The majority of all phishing sites now use SSL certificates to more closely imitate the behavior of legitimate sites. New research from RWTH Aachen, a large, German technical university, investigates the patterns behind this certificate usage. Join our hosts as we dig into the details of these findings to learn specifically which certificate types are more or less likely to appear on phishing sites - and some thoughts on why.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dd08ecfb-4bfd-4efb-840a-fa52b3518ff8</guid>
      <title>Root Causes 38: Interesting Breaches in August</title>
      <description><![CDATA[The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, stolen certificates and keys, and some interesting developments with malware-driven botnets. 
]]></description>
      <pubDate>Tue, 24 Sep 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="27583358" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4bc9f32e-4fe7-43b9-ad05-e9406add9eaf/group-item/21efecff-5443-4e22-b264-a00873459139/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 38: Interesting Breaches in August</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/cb28f7e2-2787-4177-9f09-274dd2a8c09b/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:43</itunes:duration>
      <itunes:summary>The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, stolen certificates and keys, and some interesting developments with malware-driven botnets.</itunes:summary>
      <itunes:subtitle>The month of August saw some unusual criminal activity when it comes to PKI and malware. Our hosts explain four August news stories including a SHA-1 enabled breach, stolen certificates and keys, and some interesting developments with malware-driven botnets.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fccf8537-d355-4373-a889-696240a0fc48</guid>
      <title>Root Causes 37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography?</title>
      <description><![CDATA[Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner. In this episode we examine the potential for the quantum annealing approach to break RSA-based cryptography sooner than most people have been expecting, and the difficulty of predicting the "Z date" at all. 
]]></description>
      <pubDate>Tue, 10 Sep 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="19750385" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/fc3525a7-6b55-4be4-8b52-b1a5d5ffd563/group-item/36cf5662-7b69-4f04-b5be-0bd06aaaefdb/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 37: Quantum Apocalypse - Will Quantum Annealing Break Cryptography?</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/23f2e58d-d78e-430d-8868-9b688a02acf2/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:34</itunes:duration>
      <itunes:summary>Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner. In this episode we examine the potential for the quantum annealing approach to break RSA-based cryptography sooner than most people have been expecting, and the difficulty of predicting the &quot;Z date&quot; at all.</itunes:summary>
      <itunes:subtitle>Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner. In this episode we examine the potential for the quantum annealing approach to break RSA-based cryptography sooner than most people have been expecting, and the difficulty of predicting the &quot;Z date&quot; at all.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, annealing, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">41d2d230-f453-4f7e-94a1-f3f972d074f5</guid>
      <title>Root Causes 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto</title>
      <description><![CDATA[Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community. Join us to learn about this project to discover and vet going-forward crypto candidates, where we stand in the process, and where we go from here. 
]]></description>
      <pubDate>Tue, 3 Sep 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="20180047" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/54dd9ef3-7278-4b6e-b3c4-922c84ba53b4/group-item/1ba53556-c32d-485f-9d99-92e30f40a507/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 36: Quantum Apocalypse - The Search for Quantum Resistant Crypto</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/529adc71-99c7-415c-9dff-a5defdae3c69/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:01</itunes:duration>
      <itunes:summary>Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community. Join us to learn about this project to discover and vet going-forward crypto candidates, where we stand in the process, and where we go from here.</itunes:summary>
      <itunes:subtitle>Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community. Join us to learn about this project to discover and vet going-forward crypto candidates, where we stand in the process, and where we go from here.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1de724b5-d69c-4ab2-898a-1cdd8470ba59</guid>
      <title>Root Causes 35: Quantum Apocalypse - Mosca&apos;s Inequality, Mad Max, and Mohawks</title>
      <description><![CDATA[Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have? Join our hosts Tim Callan and Jason Soroko as they explain how to calculate the ominously named "Z date," the possible consequences of missing that deadline, and potential hairstyles for a post-apocalyptic world. 
]]></description>
      <pubDate>Thu, 29 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18975923" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/e8d9b966-3d90-44ed-baf8-ab75c58e455d/group-item/841d9da4-2593-458b-93a7-1ce0a93c95f9/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 35: Quantum Apocalypse - Mosca&apos;s Inequality, Mad Max, and Mohawks</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/33dcb79f-651a-4880-8f2b-9186c6ac3403/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:45</itunes:duration>
      <itunes:summary>Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have? Join our hosts Tim Callan and Jason Soroko as they explain how to calculate the ominously named &quot;Z date,&quot; the possible consequences of missing that deadline, and potential hairstyles for a post-apocalyptic world.</itunes:summary>
      <itunes:subtitle>Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have? Join our hosts Tim Callan and Jason Soroko as they explain how to calculate the ominously named &quot;Z date,&quot; the possible consequences of missing that deadline, and potential hairstyles for a post-apocalyptic world.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30df85f1-c55a-4ca6-8d5d-b30f83a7ab2c</guid>
      <title>Root Causes 34: Shadow IT and PKI</title>
      <description><![CDATA[Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO's ability to oversee and control the enterprise's technology systems. This fragmentation leads to identity and access challenges that can affect security, governance, auditability, and compliance. Join our hosts as they discuss these challenges and what IT departments can do to address them. 
]]></description>
      <pubDate>Mon, 26 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21944671" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/f201a681-58c8-4d6f-868c-11905ff698b6/group-item/b4f1829a-3441-4f97-8de1-c2d4aa101f98/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 34: Shadow IT and PKI</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9507becd-551a-468e-835a-15991ef2ee3a/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:51</itunes:duration>
      <itunes:summary>Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO&apos;s ability to oversee and control the enterprise&apos;s technology systems. This fragmentation leads to identity and access challenges that can affect security, governance, auditability, and compliance. Join our hosts as they discuss these challenges and what IT departments can do to address them.</itunes:summary>
      <itunes:subtitle>Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO&apos;s ability to oversee and control the enterprise&apos;s technology systems. This fragmentation leads to identity and access challenges that can affect security, governance, auditability, and compliance. Join our hosts as they discuss these challenges and what IT departments can do to address them.</itunes:subtitle>
      <itunes:keywords>tls, rogue certificates, quantum, discovery, pki, webpki, mosca, shadow it, cryptography, encryption, q date, certificate lifecycle management, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bfdc1c83-b242-4048-a584-c93ea14c4cf4</guid>
      <title>Root Causes 33: Prepare for One-year Limits on SSL Certificates</title>
      <description><![CDATA[The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration, creating the same de facto situation. Our hosts discuss the trend to shorter certificates, the pluses and minuses of decreased maximum term, and automation as the only solution to fill the gap. 
]]></description>
      <pubDate>Tue, 20 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16311417" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/16500beb-d6aa-49f8-86ff-e3abb829caf5/group-item/7e2e037c-d44c-4b3c-a5bf-e198f6613ec6/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 33: Prepare for One-year Limits on SSL Certificates</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/dac7871a-9098-4c54-b77b-b49981a8924f/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:59</itunes:duration>
      <itunes:summary>The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration, creating the same de facto situation. Our hosts discuss the trend to shorter certificates, the pluses and minuses of decreased maximum term, and automation as the only solution to fill the gap.</itunes:summary>
      <itunes:subtitle>The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration, creating the same de facto situation. Our hosts discuss the trend to shorter certificates, the pluses and minuses of decreased maximum term, and automation as the only solution to fill the gap.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, certificate lifespans, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c51ef5ae-9b56-42cd-8be3-9789925da9fe</guid>
      <title>Root Causes 32: Why Do Browsers and Academic Research Say Different Things About EV SSL?</title>
      <description><![CDATA[Breaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing. And yet, leading browsers are reducing or removing EV information from the interface. Join our hosts as they explore the research results, this paradoxical browser behavior, and the effect it's likely to have on consumer security. 
]]></description>
      <pubDate>Thu, 15 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="23782855" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/142095c4-3530-4d1b-9764-82892de6c13b/group-item/308ecefa-643a-45e7-b310-6fce383302b3/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 32: Why Do Browsers and Academic Research Say Different Things About EV SSL?</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ce6fe2ce-9182-4635-99d6-e7f5292e3427/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:46</itunes:duration>
      <itunes:summary>Breaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing. And yet, leading browsers are reducing or removing EV information from the interface. Join our hosts as they explore the research results, this paradoxical browser behavior, and the effect it&apos;s likely to have on consumer security.</itunes:summary>
      <itunes:subtitle>Breaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing. And yet, leading browsers are reducing or removing EV information from the interface. Join our hosts as they explore the research results, this paradoxical browser behavior, and the effect it&apos;s likely to have on consumer security.</itunes:subtitle>
      <itunes:keywords>tls, ev, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b96c26cb-1a3b-4698-8829-8f35d0a49411</guid>
      <title>Root Causes 31: Using PKI to Authenticate Phone Callers</title>
      <description><![CDATA[Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts as they discuss public telephony systems and other environments that suffer from this problem, where this situation creates vulnerabilities, and what can be done about it. 
]]></description>
      <pubDate>Tue, 13 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="10972016" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/18988e65-e98c-4520-af02-49de73db6ba6/group-item/0ba9fd9c-0d03-4695-a820-fa285dc567e9/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 31: Using PKI to Authenticate Phone Callers</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9ad8804f-a5bf-4b10-bcde-e6c9569c25cc/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:25</itunes:duration>
      <itunes:summary>Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts as they discuss public telephony systems and other environments that suffer from this problem, where this situation creates vulnerabilities, and what can be done about it.</itunes:summary>
      <itunes:subtitle>Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts as they discuss public telephony systems and other environments that suffer from this problem, where this situation creates vulnerabilities, and what can be done about it.</itunes:subtitle>
      <itunes:keywords>pki</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">12bf9063-7b4c-4b2d-a071-c605f25889d6</guid>
      <title>Root Causes 30: When a Whole Country Has Its PII Stolen - Giant Breach Fines - Phishing with SSL</title>
      <description><![CDATA[Recently we have seen major news items in some of the common Root Causes themes. Join our hosts as they discuss new whopping breach fines from GDPR and the FTC, what happens when an entire country has its PII stolen, and phishing sites with SSL. 
]]></description>
      <pubDate>Tue, 6 Aug 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="15887188" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/b0cc1f86-0dd5-4ab9-94fc-d8f4550fffd4/group-item/8e1e87d4-2a6c-4d74-acda-ac164b1f0611/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 30: When a Whole Country Has Its PII Stolen - Giant Breach Fines - Phishing with SSL</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/fe837215-0296-404f-9292-51010b8f4d03/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:32</itunes:duration>
      <itunes:summary>Recently we have seen major news items in some of the common Root Causes themes. Join our hosts as they discuss new whopping breach fines from GDPR and the FTC, what happens when an entire country has its PII stolen, and phishing sites with SSL.</itunes:summary>
      <itunes:subtitle>Recently we have seen major news items in some of the common Root Causes themes. Join our hosts as they discuss new whopping breach fines from GDPR and the FTC, what happens when an entire country has its PII stolen, and phishing sites with SSL.</itunes:subtitle>
      <itunes:keywords>tls, gdpr, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fdae773b-25b7-4ef8-9d5c-3951e440701d</guid>
      <title>Root Causes Special Bulletin: Kazakhstan Weaponizes the Public CA</title>
      <description><![CDATA[The Kazakhstan government is taking measures to force citizens to trust its own root, enabling the widespread persecution of dissidents, journalists, and human rights advocates. Join our hosts to learn the long history of Kazakhstan's weaponization of PKI, what its effects may be, and the opportunities and challenges the browser community faces in fighting it. 
]]></description>
      <pubDate>Wed, 31 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17003139" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/030a005a-98b4-4fbf-b08e-1b4da56270fc/group-item/d88e343e-2b1c-4ebd-8c38-fd6777dd6374/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes Special Bulletin: Kazakhstan Weaponizes the Public CA</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/b6e08e3f-83a4-415a-ac8d-5ad7499a5cd8/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:42</itunes:duration>
      <itunes:summary>The Kazakhstan government is taking measures to force citizens to trust its own root, enabling the widespread persecution of dissidents, journalists, and human rights advocates. Join our hosts to learn the long history of Kazakhstan&apos;s weaponization of PKI, what its effects may be, and the opportunities and challenges the browser community faces in fighting it.</itunes:summary>
      <itunes:subtitle>The Kazakhstan government is taking measures to force citizens to trust its own root, enabling the widespread persecution of dissidents, journalists, and human rights advocates. Join our hosts to learn the long history of Kazakhstan&apos;s weaponization of PKI, what its effects may be, and the opportunities and challenges the browser community faces in fighting it.</itunes:subtitle>
      <itunes:keywords>pki, webpki, government vs encryption, e2ee</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">42f51380-b01e-4187-8e54-957c152fc405</guid>
      <title>Root Causes 29: Vulnerabilities in Cisco Routers and Other Device Integrity Controls</title>
      <description><![CDATA[Security flaws in the device integrity modules of Cisco routers and other devices have lately filled the headlines. Join our hosts and guest Alan Grau as they discuss what is happening with these flaws, why, and what to do about it. 
]]></description>
      <pubDate>Thu, 25 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21105826" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4bf47c7a-c8ca-4a74-b26c-b8d3bebb4337/group-item/e6015d5c-ca27-4b9d-b36b-2a1839acec07/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 29: Vulnerabilities in Cisco Routers and Other Device Integrity Controls</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/b81d420e-06bc-4795-9fa6-fba7d23bdbd0/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:59</itunes:duration>
      <itunes:summary>Security flaws in the device integrity modules of Cisco routers and other devices have lately filled the headlines. Join our hosts and guest Alan Grau as they discuss what is happening with these flaws, why, and what to do about it.</itunes:summary>
      <itunes:subtitle>Security flaws in the device integrity modules of Cisco routers and other devices have lately filled the headlines. Join our hosts and guest Alan Grau as they discuss what is happening with these flaws, why, and what to do about it.</itunes:subtitle>
      <itunes:keywords>cybersecurity, cisco, routers</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">249e164f-1329-4d49-82a5-ccaf84a82ba5</guid>
      <title>Root Causes 28: SSL Certificate Automation Through ACME</title>
      <description><![CDATA[ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag. Join our hosts and guest Abul Salek as they discuss this ACME, why it's important, and what's next for this hugely popular standard. 
]]></description>
      <pubDate>Mon, 22 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="22018649" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/f69f9f98-ab25-4593-ac9a-5f0ab8b19671/group-item/604617e1-5987-403b-971c-c307243f7431/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 28: SSL Certificate Automation Through ACME</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/305e75f1-e88a-4c64-b0c9-c8b70a56cc98/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:56</itunes:duration>
      <itunes:summary>ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag. Join our hosts and guest Abul Salek as they discuss this ACME, why it&apos;s important, and what&apos;s next for this hugely popular standard.</itunes:summary>
      <itunes:subtitle>ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag. Join our hosts and guest Abul Salek as they discuss this ACME, why it&apos;s important, and what&apos;s next for this hugely popular standard.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, acme, certificate lifecycle management, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5d69659c-a686-46d1-baaa-1d443a98237a</guid>
      <title>Root Causes 27: Pending Safe Browser Guidelines from Germany</title>
      <description><![CDATA[The German government has published a draft of its latest guidelines for safe browsers, which include requirements for how SSL certificates are supported and treated. Join our hosts as they discuss the German safer browser requirements and their potential impact on Germany, other governments, and industry worldwide. 
]]></description>
      <pubDate>Thu, 18 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16296370" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/462860d5-c64e-4c6f-a6ed-ce48c0a5107a/group-item/cbc86fcc-f50d-41f6-b279-fd5bc4cee495/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 27: Pending Safe Browser Guidelines from Germany</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9bb855c7-8b9e-4fef-a2be-98448a6de904/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:58</itunes:duration>
      <itunes:summary>The German government has published a draft of its latest guidelines for safe browsers, which include requirements for how SSL certificates are supported and treated. Join our hosts as they discuss the German safer browser requirements and their potential impact on Germany, other governments, and industry worldwide.</itunes:summary>
      <itunes:subtitle>The German government has published a draft of its latest guidelines for safe browsers, which include requirements for how SSL certificates are supported and treated. Join our hosts as they discuss the German safer browser requirements and their potential impact on Germany, other governments, and industry worldwide.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, browser, germany, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d4966291-a254-46e7-bb71-da6e1b0c8663</guid>
      <title>Root Causes 26: The White House Wants to Prohibit End-to-end Encryption</title>
      <description><![CDATA[The White House is the latest government entity seeking to defeat widespread encryption technology through legislated "back door" access. Join our hosts as they explain why such an idea is essentially unworkable and would endanger the confidential online business and personal services upon which we all depend. 
]]></description>
      <pubDate>Sun, 14 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17768840" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/b38777f9-2408-40dc-b86d-b259216ddfe1/group-item/d4a4ddc9-bc1e-4698-a643-4ac9db74e0ce/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 26: The White House Wants to Prohibit End-to-end Encryption</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/378d2c93-b7f2-4266-a97d-ec6c4a2ea98b/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:30</itunes:duration>
      <itunes:summary>The White House is the latest government entity seeking to defeat widespread encryption technology through legislated &quot;back door&quot; access. Join our hosts as they explain why such an idea is essentially unworkable and would endanger the confidential online business and personal services upon which we all depend.</itunes:summary>
      <itunes:subtitle>The White House is the latest government entity seeking to defeat widespread encryption technology through legislated &quot;back door&quot; access. Join our hosts as they explain why such an idea is essentially unworkable and would endanger the confidential online business and personal services upon which we all depend.</itunes:subtitle>
      <itunes:keywords>tls, pki, end to end encryption, webpki, e2ee, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1a514ed3-305e-4d3b-97f0-efb5e797fc6c</guid>
      <title>Root Causes 25: Entropy and Random Numbers</title>
      <description><![CDATA[One cornerstone of successful cryptography is entropy, or the ability to create genuinely unpredictable values. But it turns out that generating truly random numbers is harder than you might think. Join our hosts as they discuss the need for randomness, the lengths companies go to to generate random numbers, and the bad things that can happen when they fail. 
]]></description>
      <pubDate>Tue, 2 Jul 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18492328" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/79852a65-ff58-48c8-b843-4d5a0546a49d/group-item/77d004ed-593e-4d13-a610-596b82f0bac4/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 25: Entropy and Random Numbers</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/9eee571e-b061-4ff3-b58d-7e813d8d448e/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:15</itunes:duration>
      <itunes:summary>One cornerstone of successful cryptography is entropy, or the ability to create genuinely unpredictable values. But it turns out that generating truly random numbers is harder than you might think. Join our hosts as they discuss the need for randomness, the lengths companies go to to generate random numbers, and the bad things that can happen when they fail.</itunes:summary>
      <itunes:subtitle>One cornerstone of successful cryptography is entropy, or the ability to create genuinely unpredictable values. But it turns out that generating truly random numbers is harder than you might think. Join our hosts as they discuss the need for randomness, the lengths companies go to to generate random numbers, and the bad things that can happen when they fail.</itunes:subtitle>
      <itunes:keywords>tls, entropy, randomness, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">27a093ec-8dcc-4e10-bb8c-2459926995bf</guid>
      <title>Root Causes 24: Certificate Revocation</title>
      <description><![CDATA[Occasional certificate revocation is an essential part of the digital certificate lifecycle and any secure PKI scheme. Not only do certificate owners need the revoke their own certificates, but also CAs sometimes need to revoke certificates to keep trust high. Join our hosts as they discuss the whys and wherefores of revocation by the CA, especially as it relates to code signing and malware. 
]]></description>
      <pubDate>Thu, 27 Jun 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14844380" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7b20291c-4ec4-4404-87aa-1101c2ad1e9c/group-item/7f26a0f2-616a-4341-b604-0611c2046299/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 24: Certificate Revocation</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/244d7175-512d-4bd0-b7bb-3ddad65a0fe4/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:27</itunes:duration>
      <itunes:summary>Occasional certificate revocation is an essential part of the digital certificate lifecycle and any secure PKI scheme. Not only do certificate owners need the revoke their own certificates, but also CAs sometimes need to revoke certificates to keep trust high. Join our hosts as they discuss the whys and wherefores of revocation by the CA, especially as it relates to code signing and malware.</itunes:summary>
      <itunes:subtitle>Occasional certificate revocation is an essential part of the digital certificate lifecycle and any secure PKI scheme. Not only do certificate owners need the revoke their own certificates, but also CAs sometimes need to revoke certificates to keep trust high. Join our hosts as they discuss the whys and wherefores of revocation by the CA, especially as it relates to code signing and malware.</itunes:subtitle>
      <itunes:keywords>tls, revocation, pki, webpki, certificate lifecycle management, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ee2ae8a-a8cb-4a08-b8b6-40d1e0618780</guid>
      <title>Root Causes 23: Global Energy Grids Under Cyber Attack</title>
      <description><![CDATA[The world's energy grids and other utilities have increasingly become targets for cyber attack, both state-sponsored and otherwise. Join our hosts as they discuss the latest developments, possible consequences of cyber war against energy grids, and what we can do about it. 
]]></description>
      <pubDate>Thu, 20 Jun 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="15169552" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/34d575d3-5cd4-46b5-a5f6-b03daffe6b71/group-item/653962c9-9a57-42c9-b792-5d8a820a6d73/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 23: Global Energy Grids Under Cyber Attack</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:duration>00:15:48</itunes:duration>
      <itunes:summary>The world&apos;s energy grids and other utilities have increasingly become targets for cyber attack, both state-sponsored and otherwise. Join our hosts as they discuss the latest developments, possible consequences of cyber war against energy grids, and what we can do about it.</itunes:summary>
      <itunes:subtitle>The world&apos;s energy grids and other utilities have increasingly become targets for cyber attack, both state-sponsored and otherwise. Join our hosts as they discuss the latest developments, possible consequences of cyber war against energy grids, and what we can do about it.</itunes:subtitle>
      <itunes:keywords>tls, ot, critical infrastructure, cybersecurity, webpki, ssl, operational technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1a4c0f33-4bee-49e3-ad7d-0a4c12fd4af2</guid>
      <title>Root Causes 22: Attacks on US Cities with EternalBlue Cyber Weapon</title>
      <description><![CDATA[A recent spate of ransomware attacks against US municipalities is noteworthy for being enabled by the stolen US cyber weapon EternalBlue. Join our hosts as we explain this attack, its similarities to earlier incidents, and the whole syndrome of government-sponsored cyber war. 
]]></description>
      <pubDate>Fri, 7 Jun 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="16980151" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/46e4f13c-54dd-4294-99bf-80af881de4ca/group-item/5d233586-7b37-4e9d-9b42-41cfb8be9cf6/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 22: Attacks on US Cities with EternalBlue Cyber Weapon</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/d3590808-c736-48da-9698-d68379b0b256/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:41</itunes:duration>
      <itunes:summary>A recent spate of ransomware attacks against US municipalities is noteworthy for being enabled by the stolen US cyber weapon EternalBlue. Join our hosts as we explain this attack, its similarities to earlier incidents, and the whole syndrome of government-sponsored cyber war.</itunes:summary>
      <itunes:subtitle>A recent spate of ransomware attacks against US municipalities is noteworthy for being enabled by the stolen US cyber weapon EternalBlue. Join our hosts as we explain this attack, its similarities to earlier incidents, and the whole syndrome of government-sponsored cyber war.</itunes:subtitle>
      <itunes:keywords>cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ecfbf61d-1a7f-4e16-b3b3-44c06c5cbcd0</guid>
      <title>Root Causes 21: New Texas Energy Grid Security Regulation</title>
      <description><![CDATA[The state of Texas is leading the way with new legislation requiring cyber protections for its energy grid. Join our hosts as we explain this legislation, why it comes now, and its potential impact on the greater energy industry. 
]]></description>
      <pubDate>Wed, 5 Jun 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17628824" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/30ddba92-8ed4-4720-a0d9-f44d41e9bbf2/group-item/45d459b1-246d-4aea-a218-97b8e2dcf512/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 21: New Texas Energy Grid Security Regulation</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/eb59f847-f2af-40e5-a2d8-2aa06cadc819/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:21</itunes:duration>
      <itunes:summary>The state of Texas is leading the way with new legislation requiring cyber protections for its energy grid. Join our hosts as we explain this legislation, why it comes now, and its potential impact on the greater energy industry.</itunes:summary>
      <itunes:subtitle>The state of Texas is leading the way with new legislation requiring cyber protections for its energy grid. Join our hosts as we explain this legislation, why it comes now, and its potential impact on the greater energy industry.</itunes:subtitle>
      <itunes:keywords>ot, cybersecurity, regulation, texas energy grid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">63860078-3332-456f-a514-25250b62839e</guid>
      <title>Root Causes 20: 885 Million First American Financial Customer Docs Exposed</title>
      <description><![CDATA[It was recently revealed that First American Title Corporation had 885 million confidential customer financial documents discoverable in the clear on its online site. These documents contain all the most sensitive information necessary for identity theft, spear phishing, and other exploits against individuals. Join our hosts as they discuss the details of this exposure, how it may have come about, and its potential consequences. 
]]></description>
      <pubDate>Fri, 31 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13504821" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/50a205a8-fc24-427f-9e17-23020f14b11a/group-item/4e9ea712-78cf-425d-b779-8956057f20d8/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 20: 885 Million First American Financial Customer Docs Exposed</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ecc30e65-b6e4-4f90-961f-7a97ed90d218/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:04</itunes:duration>
      <itunes:summary>It was recently revealed that First American Title Corporation had 885 million confidential customer financial documents discoverable in the clear on its online site. These documents contain all the most sensitive information necessary for identity theft, spear phishing, and other exploits against individuals. Join our hosts as they discuss the details of this exposure, how it may have come about, and its potential consequences.</itunes:summary>
      <itunes:subtitle>It was recently revealed that First American Title Corporation had 885 million confidential customer financial documents discoverable in the clear on its online site. These documents contain all the most sensitive information necessary for identity theft, spear phishing, and other exploits against individuals. Join our hosts as they discuss the details of this exposure, how it may have come about, and its potential consequences.</itunes:subtitle>
      <itunes:keywords>cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10f25621-c108-4796-a13c-cd214dd2f6f9</guid>
      <title>Root Causes 19: Death of a Public CA</title>
      <description><![CDATA[Mozilla has decided to remove a public CA from its trusted root store. By doing so Mozilla renders public certificates from this CA essentially valueless for almost all use cases. Join our hosts as the examine the reasons for this decision, how CA rules are made and maintained, and why an action like this one ultimately is healthy for the internet as a whole. 
]]></description>
      <pubDate>Thu, 30 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13434604" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/4b0d8b74-b158-406f-b6c2-f83d9330fffb/group-item/dbf62289-f511-4ff1-94ea-8756d73912c1/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 19: Death of a Public CA</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/8a8245d8-9cea-4c87-878c-a6f6605b0b94/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:59</itunes:duration>
      <itunes:summary>Mozilla has decided to remove a public CA from its trusted root store. By doing so Mozilla renders public certificates from this CA essentially valueless for almost all use cases. Join our hosts as the examine the reasons for this decision, how CA rules are made and maintained, and why an action like this one ultimately is healthy for the internet as a whole.</itunes:summary>
      <itunes:subtitle>Mozilla has decided to remove a public CA from its trusted root store. By doing so Mozilla renders public certificates from this CA essentially valueless for almost all use cases. Join our hosts as the examine the reasons for this decision, how CA rules are made and maintained, and why an action like this one ultimately is healthy for the internet as a whole.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, ssl, distrust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7b7927f8-f2e1-4a1d-841f-85939f4f303b</guid>
      <title>Root Causes 18: SHA-1 Collisions - TLS Fingerprinting - Cisco Trust Anchor Flaw</title>
      <description><![CDATA[Recent news has revealed several important developments in PKI and cyber trust. Our hosts cover the latest SHA-1 collision attack and why it signals the inevitable death of this hashing algorithm. We explain TLS fingerprinting and how it enables malware to defeat firewall AI protections. And we walk through reports of a flaw in the implementation of secure elements on Cisco routers. 
]]></description>
      <pubDate>Thu, 23 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="20871351" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/1a82d07c-483f-4792-a709-30266c6fa93d/group-item/89c75874-1012-4431-b6ad-5c34a3192558/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 18: SHA-1 Collisions - TLS Fingerprinting - Cisco Trust Anchor Flaw</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/4c4dc34b-fd6c-40c4-aa42-98f6b153a2d9/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:44</itunes:duration>
      <itunes:summary>Recent news has revealed several important developments in PKI and cyber trust. Our hosts cover the latest SHA-1 collision attack and why it signals the inevitable death of this hashing algorithm. We explain TLS fingerprinting and how it enables malware to defeat firewall AI protections. And we walk through reports of a flaw in the implementation of secure elements on Cisco routers.</itunes:summary>
      <itunes:subtitle>Recent news has revealed several important developments in PKI and cyber trust. Our hosts cover the latest SHA-1 collision attack and why it signals the inevitable death of this hashing algorithm. We explain TLS fingerprinting and how it enables malware to defeat firewall AI protections. And we walk through reports of a flaw in the implementation of secure elements on Cisco routers.</itunes:subtitle>
      <itunes:keywords>tls, hashing, pki, webpki, cryptographic primitive, sha-1, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f0bf4361-85b3-4f51-b4b4-0ccc7968129f</guid>
      <title>Root Causes 17: Sectigo Acquires Icon Labs</title>
      <description><![CDATA[Sectigo's recent acquisition of Icon Labs expands the company's  capabilities in embedded OEM and device identity. Jason and Tim are joined by Icon Labs co-founder Alan Grau as our podcasters explore the needs and potential vulnerabilities for connected devices and the suite of technologies that can address these security requirements. 
]]></description>
      <pubDate>Thu, 16 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18934529" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/b4f426b2-22d9-4909-9760-8ac8a49588ed/group-item/1da7be56-b305-44d1-882b-c8d52c3d2560/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 17: Sectigo Acquires Icon Labs</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ff468ccb-52a7-4def-a555-56319243fdfc/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:43</itunes:duration>
      <itunes:summary>Sectigo&apos;s recent acquisition of Icon Labs expands the company&apos;s  capabilities in embedded OEM and device identity. Jason and Tim are joined by Icon Labs co-founder Alan Grau as our podcasters explore the needs and potential vulnerabilities for connected devices and the suite of technologies that can address these security requirements.</itunes:summary>
      <itunes:subtitle>Sectigo&apos;s recent acquisition of Icon Labs expands the company&apos;s  capabilities in embedded OEM and device identity. Jason and Tim are joined by Icon Labs co-founder Alan Grau as our podcasters explore the needs and potential vulnerabilities for connected devices and the suite of technologies that can address these security requirements.</itunes:subtitle>
      <itunes:keywords>tls, cybersecurity, pki, embedded, iot</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">61a1f179-7365-434e-afc3-c6c62be1fa5a</guid>
      <title>Root Causes 16: PKI for DevOps Environments</title>
      <description><![CDATA[DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud. Learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe. 
]]></description>
      <pubDate>Tue, 14 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="22376840" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/f8abd012-4409-4cb2-886f-d6d9b30b8576/group-item/dfe9ea04-a2b6-4f08-ae20-fdaa2d05a3a2/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 16: PKI for DevOps Environments</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/a572e853-1220-45a7-bf59-4bc14ebe39f2/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:18</itunes:duration>
      <itunes:summary>DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud. Learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.</itunes:summary>
      <itunes:subtitle>DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud. Learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.</itunes:subtitle>
      <itunes:keywords>tls, devops, pki, mtls, ssl, devsecops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c822f94-8707-4ee7-a183-76dd5eb4c238</guid>
      <title>Root Causes 15: Architecture for Enterprise Certificate Automation</title>
      <description><![CDATA[Automation of certificate deployment and management is a must for today's enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away. Join our hosts as they detail the whys and hows of enterprise certificate automation. A must-listen for anyone seeking to understand this rapidly emerging technology space. 
]]></description>
      <pubDate>Tue, 7 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18486476" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/07248faf-e6de-4e8e-9e2f-35daea86683f/group-item/006e4be1-437a-4e57-a4d3-38d3ccab88ea/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 15: Architecture for Enterprise Certificate Automation</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/366c5df8-43b3-4d50-9063-5f4728a86aa6/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:15</itunes:duration>
      <itunes:summary>Automation of certificate deployment and management is a must for today&apos;s enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away. Join our hosts as they detail the whys and hows of enterprise certificate automation. A must-listen for anyone seeking to understand this rapidly emerging technology space.</itunes:summary>
      <itunes:subtitle>Automation of certificate deployment and management is a must for today&apos;s enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away. Join our hosts as they detail the whys and hows of enterprise certificate automation. A must-listen for anyone seeking to understand this rapidly emerging technology space.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, certificate lifecycle management, certificate lifespans, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3884127a-f112-47b9-ac6e-c4a1ac060abe</guid>
      <title>Root Causes 14: P2P Vulnerability in IoT Devices</title>
      <description><![CDATA[Recent research reveals millions of consumer IoT devices that lack any level of authentication or encryption at all. Join our hosts as we discuss the nature of IoT-based botnets and their negative consequences on enterprises, consumers, and the internet at large, including DDoS, phishing, and more. 
]]></description>
      <pubDate>Thu, 2 May 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="21150130" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/76938789-e844-4bca-b216-75f3f6fef41e/group-item/115b766a-563d-49a3-9919-3e22234b92df/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 14: P2P Vulnerability in IoT Devices</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/ded2d9cf-8ec3-4789-8eb6-b7d513bb2246/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:01</itunes:duration>
      <itunes:summary>Recent research reveals millions of consumer IoT devices that lack any level of authentication or encryption at all. Join our hosts as we discuss the nature of IoT-based botnets and their negative consequences on enterprises, consumers, and the internet at large, including DDoS, phishing, and more.</itunes:summary>
      <itunes:subtitle>Recent research reveals millions of consumer IoT devices that lack any level of authentication or encryption at all. Join our hosts as we discuss the nature of IoT-based botnets and their negative consequences on enterprises, consumers, and the internet at large, including DDoS, phishing, and more.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, iot, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ffee02e-c2db-4cd9-99f7-48c404d61732</guid>
      <title>Root Causes 13: PKI for IoT</title>
      <description><![CDATA[The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed. Learn how identity is an essential part of protecting any service involving IoT devices and how PKI is positioned to provide that identity. 
]]></description>
      <pubDate>Thu, 25 Apr 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="19428138" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/c1ff1185-939b-4bc1-bff6-8367e2a603cb/group-item/173d0e86-7d4b-4c73-b491-cda53e113e02/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 13: PKI for IoT</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/a04b51d2-6958-4446-a245-f7171a4a973d/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:14</itunes:duration>
      <itunes:summary>The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed. Learn how identity is an essential part of protecting any service involving IoT devices and how PKI is positioned to provide that identity.</itunes:summary>
      <itunes:subtitle>The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed. Learn how identity is an essential part of protecting any service involving IoT devices and how PKI is positioned to provide that identity.</itunes:subtitle>
      <itunes:keywords>tls, cybersecurity, pki, webpki, iot, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">01a8d7c6-5e4c-446f-b510-8ab4e46a557e</guid>
      <title>Root Causes 12: PKI in the News</title>
      <description><![CDATA[It was a busy news week for PKI and authenticated identity, and our hosts run through four current stories to clarify them. Tune in to learn the latest about the Dragonblood WPA3 vulnerability, Russian spoofing of GPS/GNSS navigation signals, Know Your Customer (KYC) for social media sites, and a Chinese national's apparent attempt to install a USB rootkit somewhere in Mar-a-Lago. 
]]></description>
      <pubDate>Tue, 16 Apr 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18400795" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/969f9f6c-8513-4bb5-bbde-2f6dd8ff1358/group-item/8a66b703-f915-47b6-8a3c-890f9c83d984/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 12: PKI in the News</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/0112c39b-26f7-41ae-9293-9a6defc2e7b7/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:10</itunes:duration>
      <itunes:summary>It was a busy news week for PKI and authenticated identity, and our hosts run through four current stories to clarify them. Tune in to learn the latest about the Dragonblood WPA3 vulnerability, Russian spoofing of GPS/GNSS navigation signals, Know Your Customer (KYC) for social media sites, and a Chinese national&apos;s apparent attempt to install a USB rootkit somewhere in Mar-a-Lago.</itunes:summary>
      <itunes:subtitle>It was a busy news week for PKI and authenticated identity, and our hosts run through four current stories to clarify them. Tune in to learn the latest about the Dragonblood WPA3 vulnerability, Russian spoofing of GPS/GNSS navigation signals, Know Your Customer (KYC) for social media sites, and a Chinese national&apos;s apparent attempt to install a USB rootkit somewhere in Mar-a-Lago.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a24ac683-c597-4ba7-a79d-15a795a54379</guid>
      <title>Root Causes 11: Authentication Is Not for the Authenticated</title>
      <description><![CDATA[With so much debate about the role and importance of authentication in digital systems, it is important to remember the purpose of authenticated identity in our cyber interactions. Join us for a discussion of who benefits from known identity, what can go wrong when identity is obscured, and why ecosystems must include incentives for members to participate in identity authentication. 
]]></description>
      <pubDate>Thu, 11 Apr 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="13599725" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/a9aeabd8-ce98-4b40-b36c-8847bef34bf8/group-item/36429672-130b-4873-99e1-49f39fe1853a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 11: Authentication Is Not for the Authenticated</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/a1afe20c-352b-4fc7-8573-2565193b671d/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:09</itunes:duration>
      <itunes:summary>With so much debate about the role and importance of authentication in digital systems, it is important to remember the purpose of authenticated identity in our cyber interactions. Join us for a discussion of who benefits from known identity, what can go wrong when identity is obscured, and why ecosystems must include incentives for members to participate in identity authentication.</itunes:summary>
      <itunes:subtitle>With so much debate about the role and importance of authentication in digital systems, it is important to remember the purpose of authenticated identity in our cyber interactions. Join us for a discussion of who benefits from known identity, what can go wrong when identity is obscured, and why ecosystems must include incentives for members to participate in identity authentication.</itunes:subtitle>
      <itunes:keywords>tls, authentication, signing, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">75d8ad47-e138-42b1-8d10-ea0dc5645830</guid>
      <title>Root Causes 10: S/MIME Automated Deployment</title>
      <description><![CDATA[S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments - providing strong defenses against a variety of email-based attacks.  Nonetheless, adoption today is extremely small. Find out what the challenges to past adoption have been for this underutilized security technology and what the industry is doing to help enterprises secure their email today. 
]]></description>
      <pubDate>Wed, 3 Apr 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="17928919" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/3a8fa08b-c8e0-4932-bb87-425998613bc6/group-item/17d377fb-7843-4154-a816-2093377242a2/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 10: S/MIME Automated Deployment</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/06737c18-e005-4e94-9ba8-6318cbda2685/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:40</itunes:duration>
      <itunes:summary>S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments - providing strong defenses against a variety of email-based attacks.  Nonetheless, adoption today is extremely small. Find out what the challenges to past adoption have been for this underutilized security technology and what the industry is doing to help enterprises secure their email today.</itunes:summary>
      <itunes:subtitle>S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments - providing strong defenses against a variety of email-based attacks.  Nonetheless, adoption today is extremely small. Find out what the challenges to past adoption have been for this underutilized security technology and what the industry is doing to help enterprises secure their email today.</itunes:subtitle>
      <itunes:keywords>tls, s/mime, signing, pki, email, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b796eeb4-841c-4b2c-9f47-036d3487ef6b</guid>
      <title>Root Causes 09: 63-bit Serial Numbers</title>
      <description><![CDATA[A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements.  Learn how it is that 64-bit certificate serial numbers might offer only 63 bits of entropy and what CAs have to do about it. 
]]></description>
      <pubDate>Mon, 25 Mar 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14592351" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/014133e1-7f2c-4a14-bedc-be2c3bd3a712/group-item/6408549e-a953-4b74-8a5f-84d82a6cc46a/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 09: 63-bit Serial Numbers</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/6b794edb-5423-42ac-9a89-1984a4bc4498/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:11</itunes:duration>
      <itunes:summary>A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements.  Learn how it is that 64-bit certificate serial numbers might offer only 63 bits of entropy and what CAs have to do about it.</itunes:summary>
      <itunes:subtitle>A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements.  Learn how it is that 64-bit certificate serial numbers might offer only 63 bits of entropy and what CAs have to do about it.</itunes:subtitle>
      <itunes:keywords>tls, bit length, pki, webpki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f4a6dfed-40f1-4000-b760-92866a71afa5</guid>
      <title>Root Causes 08: Free PKI Is Not Free</title>
      <description><![CDATA[The promise of a "free" Microsoft CA was alluring to enterprises in the 2000s, but today's increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA. Learn about the seven common use cases where your traditional CA no longer does the job. 
]]></description>
      <pubDate>Tue, 19 Mar 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18220654" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7eeb16b4-5aca-416f-87bd-b7e866a22a39/group-item/1ded4af3-7b26-443c-80b4-94ff6e606c96/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 08: Free PKI Is Not Free</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/192a8057-486a-4237-a20d-a348b4fb8884/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:58</itunes:duration>
      <itunes:summary>The promise of a &quot;free&quot; Microsoft CA was alluring to enterprises in the 2000s, but today&apos;s increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA. Learn about the seven common use cases where your traditional CA no longer does the job.</itunes:summary>
      <itunes:subtitle>The promise of a &quot;free&quot; Microsoft CA was alluring to enterprises in the 2000s, but today&apos;s increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA. Learn about the seven common use cases where your traditional CA no longer does the job.</itunes:subtitle>
      <itunes:keywords>tls, microsoft adca, msca, pki, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dbc9ce20-8cd0-4f5e-a6b2-0d008c2ada95</guid>
      <title>Root Causes 07: Russian Disconnection from the Internet</title>
      <description><![CDATA[Russia has stated that it will disconnect from the internet as a trial exercise for full-blown cyber warfare. This idea presents many problems for Russian services, systems, and businesses, especially since they depend on global systems such as DNS and public Certificate Authorities. Join us to learn some of the problems facing Russia will face if indeed it disconnects. 
]]></description>
      <pubDate>Sat, 9 Mar 2019 23:50:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="11055162" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/8466642b-e08e-484e-b708-e866128050db/group-item/b913b298-e549-4d73-81c0-53371ab3f770/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 07: Russian Disconnection from the Internet</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/e6205290-481b-414c-b038-3916c106e8ab/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:30</itunes:duration>
      <itunes:summary>Russia has stated that it will disconnect from the internet as a trial exercise for full-blown cyber warfare. This idea presents many problems for Russian services, systems, and businesses, especially since they depend on global systems such as DNS and public Certificate Authorities. Join us to learn some of the problems facing Russia will face if indeed it disconnects.</itunes:summary>
      <itunes:subtitle>Russia has stated that it will disconnect from the internet as a trial exercise for full-blown cyber warfare. This idea presents many problems for Russian services, systems, and businesses, especially since they depend on global systems such as DNS and public Certificate Authorities. Join us to learn some of the problems facing Russia will face if indeed it disconnects.</itunes:subtitle>
      <itunes:keywords>sovereign internet</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b9483238-8dad-4371-b40a-ba82ce09a6ca</guid>
      <title>Root Causes 06: Quantum-Resistant Cryptography</title>
      <description><![CDATA[The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse. 
]]></description>
      <pubDate>Sat, 9 Mar 2019 23:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="19899596" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/6f18e044-855e-4882-b13f-8aee7608e748/group-item/d8aa07a9-bc55-4e21-8365-17e59645b69c/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 06: Quantum-Resistant Cryptography</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/6b02899c-3808-4e12-a6c0-8fd957230114/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:43</itunes:duration>
      <itunes:summary>The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.</itunes:summary>
      <itunes:subtitle>The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">52976ddf-4226-4968-806a-90269e54ab71</guid>
      <title>Root Causes 05:  Cryptographic Quantum Apocalypse</title>
      <description><![CDATA[The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse. 
]]></description>
      <pubDate>Sat, 9 Mar 2019 22:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="18394943" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/cacf675f-1378-4e74-b101-a52a45e4969e/group-item/f8c44aaa-c525-43e8-abb2-abd7595dd9dc/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 05:  Cryptographic Quantum Apocalypse</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/494ef27f-edf4-42c7-bcaf-c8618757eac5/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:09</itunes:duration>
      <itunes:summary>The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.</itunes:summary>
      <itunes:subtitle>The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices. Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.</itunes:subtitle>
      <itunes:keywords>tls, quantum, pki, webpki, mosca, cryptography, encryption, q date, z date, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7106c3f8-7276-4480-b9e6-1c31936daf78</guid>
      <title>Root Causes 04:  Australia&apos;s New IT Security Back Door</title>
      <description><![CDATA[Australia now requires a back door to IT systems. Our hosts are skeptical that this idea will work. Join our PKI experts to learn about the dangers and pitfalls of such a system - and why they have failed in the past. 
]]></description>
      <pubDate>Fri, 8 Mar 2019 19:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="24118476" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7e5aa020-af6c-49b9-933e-d7218f590a65/group-item/92e43681-ac50-4e1b-8cca-48ab6a5361ec/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 04:  Australia&apos;s New IT Security Back Door</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/5b2bd86b-1621-481d-bab7-9ceb49429821/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:07</itunes:duration>
      <itunes:summary>Australia now requires a back door to IT systems. Our hosts are skeptical that this idea will work. Join our PKI experts to learn about the dangers and pitfalls of such a system - and why they have failed in the past.</itunes:summary>
      <itunes:subtitle>Australia now requires a back door to IT systems. Our hosts are skeptical that this idea will work. Join our PKI experts to learn about the dangers and pitfalls of such a system - and why they have failed in the past.</itunes:subtitle>
      <itunes:keywords>government vs encryption, e2ee, australia</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8dc7f45a-2365-4f69-abea-33e82f4b20ee</guid>
      <title>Root Causes 03:  US Government Shutdown and Security Vulnerabilities</title>
      <description><![CDATA[The US government shutdown has taken its toll on IT systems. Services are going offline, and we are ill equipped to deal with a major security or service crisis. Tune in to learn more about the risks of the ongoing shutdown to the government's technical infrastructure. 
]]></description>
      <pubDate>Fri, 8 Mar 2019 15:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="14756609" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/c37ffc23-e375-4b84-9d23-950896a9b328/group-item/51acb08a-1899-4adc-817a-27405f2f7053/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 03:  US Government Shutdown and Security Vulnerabilities</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/fc8d8550-9664-4c15-9b1d-7b29f81d79b5/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:22</itunes:duration>
      <itunes:summary>The US government shutdown has taken its toll on IT systems. Services are going offline, and we are ill equipped to deal with a major security or service crisis. Tune in to learn more about the risks of the ongoing shutdown to the government&apos;s technical infrastructure.</itunes:summary>
      <itunes:subtitle>The US government shutdown has taken its toll on IT systems. Services are going offline, and we are ill equipped to deal with a major security or service crisis. Tune in to learn more about the risks of the ongoing shutdown to the government&apos;s technical infrastructure.</itunes:subtitle>
      <itunes:keywords>tls, pki, webpki, cryptography, encryption, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5cd325f2-a53b-42de-b745-91acae75fbae</guid>
      <title>Root Causes 02:  O2 Outage and Equifax Breach</title>
      <description><![CDATA[In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach.  The common thread?  Both occurred due to certificate expirations. Join our hosts to learn more about this trending vulnerability. 
]]></description>
      <pubDate>Fri, 8 Mar 2019 14:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="15137787" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/7b85b850-fd24-4647-a62a-91af8e20b7b8/group-item/95de1498-e3a6-4ddc-a4c8-87f27aaac300/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 02:  O2 Outage and Equifax Breach</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/3998e484-36de-402e-a291-4486372e6892/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:46</itunes:duration>
      <itunes:summary>In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach.  The common thread?  Both occurred due to certificate expirations. Join our hosts to learn more about this trending vulnerability.</itunes:summary>
      <itunes:subtitle>In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach.  The common thread?  Both occurred due to certificate expirations. Join our hosts to learn more about this trending vulnerability.</itunes:subtitle>
      <itunes:keywords>tls, breach, outage, pki, webpki, cryptography, encryption, certificate lifecycle management, ssl</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c1a4de7b-944c-4681-a0ec-1df0fa6ebb6b</guid>
      <title>Root Causes 01:  Introduction</title>
      <description><![CDATA[Intro to the leading PKI and security podcast. Learn your hosts' qualifications and reasons for creating this podcast. 
]]></description>
      <pubDate>Fri, 8 Mar 2019 00:00:00 +0000</pubDate>
      <author>tim.callan@sectigo.com (Jason Soroko, Tim Callan)</author>
      <link>https://soundcloud.com/tim-callan</link>
      <enclosure length="8069262" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/98a2cf9a-b069-459d-8483-87ad37ac3651/4ec7ffec-c24d-4d4d-8cce-08bc7ad5f293/episodes/audio/group/c38f6ac9-63e3-444d-aaac-094739fbfbdb/group-item/6a84ca30-3bdd-4d45-a69f-346c9f8b27e8/128_default_tc.mp3?aid=rss_feed&amp;feed=GmfATUT8"/>
      <itunes:title>Root Causes 01:  Introduction</itunes:title>
      <itunes:author>Jason Soroko, Tim Callan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/2721eae2-fbcd-4ebd-ba44-0ec79ff755ef/f2f89e95-6ff9-4339-81f3-b7b753441379/3000x3000/root_causes_logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:24</itunes:duration>
      <itunes:summary>Intro to the leading PKI and security podcast. Learn your hosts&apos; qualifications and reasons for creating this podcast.</itunes:summary>
      <itunes:subtitle>Intro to the leading PKI and security podcast. Learn your hosts&apos; qualifications and reasons for creating this podcast.</itunes:subtitle>
      <itunes:keywords>pki, webpki, root causes podcast</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>