Root Causes 587: AI Orchestration for Attackers
Jason describes a recent intrusion almost entirely operated by off-the-shelf AI tools. This is an important milestone in security. We describe its potential consequences.
Root Causes 586: Beyond Harvest Now Decrypt Later
We expand on the concept of trust-now-forge-later to list a whole bevy of additional attacks that eventually will be enabled by cryptographically relevant quantum computers.
Root Causes 585: The Cryptographic Inventory Manifesto
We all love a good manifesto! Jason spells out the ten principles of the Cryptographic Inventory Manifesto, and we discuss.
Root Causes 584: Mapping DORA to CLM
We look at the new European DORA and NIS2 regulations and how Certificate Lifecycle Management is a key requirement to meet these requirements. You will be surprised how explicit these requirements are.
Root Causes 583: AI Versus ECC P 256
Recorded in Ottawa Ontario.