For the second time in under twelve months, a major browser is deprecating a CA's public trust. This time it's E-Tugra.
Public CA TrustCor has had its roots deprecated by Microsoft and Mozilla. We explain what happened and why these roots ultimately were distrusted.
Google Chrome recently announced the formation of its trusted root program. We explain why Chrome is launching now and the program's implications.
Mozilla is a highly important to the world of public certificates, with influence beyond what its browser market share would suggest. We examine why.
The root certificates of the EU's Covid Passport program have suffered a private key compromise and counterfeit passports are for sale on the black market.
Let's Encrypt's recent root expiration caused widespread service outages. We discuss this expiration and the recipe for avoiding problems in the future.
In 2019 the Kazakh government attempted to force its citizens to trust its private root. A recent research paper examines this attack.
Trust models in multi-vendor environments are particularly tricky. Learn about best practices in trusted roots for complex, global supply chain ecosystems.
Google has announced distrust for Spanish public CA Camerfirma in Chrome build 90. We explain the reasons for (and implications of) this decision.
Our hosts discuss what compliance means at a public Certificate Authority (CA) like Sectigo and what the Chief Compliance Officer does.
Root expirations occasionally make headlines by breaking systems, but it's a fact that certificates expire every day, each a outage waiting to happen.
14 public CAs have to revoke intermediates and destroy their keys, putting millions of active SSL, S/MIME, and other public certificates at risk.