HackerGuardian 2.0 On-Demand Webcasts

HackerGuardian 2.0

Come learn more about our new and improved PCI Compliance product, HackerGuardian. After the overview, we will be presenting a demo on all of the product's capabilities.
Understanding the Role of Extended Validation Certificates in Internet Abuse White Papers

Understanding the Role of Extended Validation Certificates in Internet Abuse

Original research from Georgia Tech's Cyber Forensics Innovation Lab shows that domains with EV SSL certificates are 99.99% likely to be free of online abuse. Download the report here.
HackerGuardian - Sectigo PCI Compliance Technical Documents & Guides

HackerGuardian - Sectigo PCI Compliance

Generates two PCI network reports that are similar but intended for different purposes: One designed to offer proof of compliance, and the other to serve as a remediation guide.
AutoApplyOrder API Technical Documents & Guides

AutoApplyOrder API

Our new, single API – AutoApplyOrder – makes requesting not only our range of SSL certificates, but also new products such as CodeGuard, HackerGuardian PCI Compliance, VPN and easier than ever.
Root Causes 1-64: What Is Digital Identity? copy Podcast

Root Causes 1-64: What Is Digital Identity? copy

Quantum key distribution is a new technology that uses the principles of quantum physics to generate and distribute truly random keys for encrypted communication.
Root Causes 1-63 - What Is CAA? copy Podcast

Root Causes 1-63 - What Is CAA? copy

The phrase "identity is the new perimeter" has gained in use of late, reflecting the reality that today's modern enterprise architecture is a mix of traditional and cloud, owned and rented and BYOD, all together in a complex mix.
Root Causes 1-62: Windows CryptoAPI Spoofing Vulnerability Explained copy Podcast

Root Causes 1-62: Windows CryptoAPI Spoofing Vulnerability Explained copy

CAA, which stands for CA Authentication, is the capability for the domain name owner to specify in DNS which CAs are allowed to issue SSL certificates for a specific domain. Join us today to learn more about CAA.
Root Causes 1-61: Anatomy of a Cryptocurrency copy Podcast

Root Causes 1-61: Anatomy of a Cryptocurrency copy

On January 14 Microsoft announced a vulnerability that makes it possible to defeat the authentication of Elliptic Curve Cryptography on Windows 10 and Windows Server systems, making it possible to create fake certificates on trusted roots.
Root Causes 1-60: Fundamentals of Blockchain copy Podcast

Root Causes 1-60: Fundamentals of Blockchain copy

In our ongoing series about blockchain, we explore the technology, process, and ecosystem needs for a successful cryptocurrency.
Root Causes 1-59: What Is Certificate Transparency? copy Podcast

Root Causes 1-59: What Is Certificate Transparency? copy

Widely understood to be the technology behind popular crypto currencies, blockchain has become a household word. But what it blockchain really, and how does it work?
Root Causes 1-58: 2019 Lookback - One Year of Podcasting copy Podcast

Root Causes 1-58: 2019 Lookback - One Year of Podcasting copy

Certificate Transparency (CT) is a recent and important development in the world of SSL certificates. Popular browsers require trusted CAs to log all SSL certificates to publicly available CT Logs.
Root Causes 1-57: Quantum Random Number Generation copy Podcast

Root Causes 1-57: Quantum Random Number Generation copy

Nearly a year ago our hosts launched Root Causes to provide a forum for discussion of the issues surrounding the critically important PKI technology.