Podcasting is an incredible way of reaching out to new people and being challenged to think in new ways. I’ve had the pleasure to appear with some of the greatest podcasters in technology and Business.
[{"id":1006,"link":"https:\/\/www.korte.co\/2024\/09\/15\/podcast-listening-with-leaders\/","name":"podcast-listening-with-leaders","thumbnail":{"url":false,"alt":false},"title":"Podcast: Listening with Leaders","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Sep 15, 2024","dateGMT":"2024-09-15 23:45:43","modifiedDate":"2024-09-15 16:45:45","modifiedDateGMT":"2024-09-15 23:45:45","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/leadership\/' rel='post_tag'>Leadership<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":18},"status":"publish","excerpt":"I had the great pleasure of discussing listening to founders and the decorum in the board room with Doug Noll on Listening with Leaders."},{"id":641,"link":"https:\/\/www.korte.co\/2023\/07\/29\/tech-main-presents-cybersecurity-as-organizational-asset\/","name":"tech-main-presents-cybersecurity-as-organizational-asset","thumbnail":{"url":false,"alt":false},"title":"Tech & Main Presents: Cybersecurity As Organizational Asset","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 29, 2023","dateGMT":"2023-07-29 13:14:00","modifiedDate":"2023-07-28 16:28:55","modifiedDateGMT":"2023-07-28 23:28:55","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/mediamentions\/' rel='post_tag'>MediaMentions<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":14},"status":"publish","excerpt":"I was happy to discuss cybersecurity, identity management, and the intersection of emotions and technology with\u00a0Shaun St.Hill, on the Tech & Main podcast."},{"id":635,"link":"https:\/\/www.korte.co\/2023\/07\/24\/podcast-in-systems-we-trust\/","name":"podcast-in-systems-we-trust","thumbnail":{"url":false,"alt":false},"title":"Podcast: In Systems We Trust","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 24, 2023","dateGMT":"2023-07-24 13:28:37","modifiedDate":"2023-07-24 13:28:37","modifiedDateGMT":"2023-07-24 13:28:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":13},"status":"publish","excerpt":"Tune in now to \"In Systems We Trust\" to get a unique take on identity management and why the human component can't be seen as separate from the IT-System."},{"id":628,"link":"https:\/\/www.korte.co\/2023\/07\/17\/unriveted-tales-of-digital-transformation-and-cyber-security\/","name":"unriveted-tales-of-digital-transformation-and-cyber-security","thumbnail":{"url":false,"alt":false},"title":"Unriveted: Tales of Digital Transformation and Cyber Security","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 17, 2023","dateGMT":"2023-07-17 17:52:40","modifiedDate":"2023-07-17 17:52:40","modifiedDateGMT":"2023-07-17 17:52:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":24},"status":"publish","excerpt":"Join me on this week's Unriveted Podcast, where hosts\u00a0Martin Miller\u00a0and\u00a0John Sukup\u00a0ask the hard questions: \"What is your credit card number?\""},{"id":602,"link":"https:\/\/www.korte.co\/2023\/06\/01\/podcast-msp-initiative-live-with-kevin-dominik-korte-from-univention\/","name":"podcast-msp-initiative-live-with-kevin-dominik-korte-from-univention","thumbnail":{"url":false,"alt":false},"title":"Podcast: MSP INITIATIVE LIVE WITH KEVIN DOMINIK KORTE FROM UNIVENTION","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jun 1, 2023","dateGMT":"2023-06-01 23:40:01","modifiedDate":"2023-06-01 23:40:02","modifiedDateGMT":"2023-06-01 23:40:02","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>, <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a> <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a><a href='https:\/\/www.korte.co\/tag\/video\/' rel='post_tag'>Video<\/a>"},"readTime":{"min":0,"sec":38},"status":"publish","excerpt":"MSPs are important partners for us at Univention. Today, I enjoyed discussing Identity Management with George Bardissi of the MSP Initiative."},{"id":587,"link":"https:\/\/www.korte.co\/2023\/05\/12\/podcast-a-geek-leader-311-identity-management\/","name":"podcast-a-geek-leader-311-identity-management","thumbnail":{"url":false,"alt":false},"title":"Podcast: A Geek Leader 311: Identity Management","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"May 12, 2023","dateGMT":"2023-05-12 23:36:00","modifiedDate":"2023-05-15 12:43:59","modifiedDateGMT":"2023-05-15 12:43:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":25},"status":"publish","excerpt":"Leadership is often defined as inspiring people to do the right thing. Listening, to people is as important for inspiration as saying the right words."},{"id":563,"link":"https:\/\/www.korte.co\/2023\/04\/12\/podcast-a-rollercoaster-on-the-jason-cavness-experience\/","name":"podcast-a-rollercoaster-on-the-jason-cavness-experience","thumbnail":{"url":false,"alt":false},"title":"Podcast: A Rollercoaster on The Jason Cavness Experience","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Apr 12, 2023","dateGMT":"2023-04-12 13:41:14","modifiedDate":"2023-04-12 13:41:15","modifiedDateGMT":"2023-04-12 13:41:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a>, <a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a> <a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/current-thoughts\/' rel='post_tag'>Current Thoughts<\/a><a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":35},"status":"publish","excerpt":"From Model trains to Open-source, Gardening to Sailing the Atlantic, and Cybersecurity to being a Dad, Jason Cavness takes a dive into all aspects that make me."},{"id":554,"link":"https:\/\/www.korte.co\/2023\/04\/03\/podcast-how-to-turn-it-from-a-hindrance-into-an-asset\/","name":"podcast-how-to-turn-it-from-a-hindrance-into-an-asset","thumbnail":{"url":false,"alt":false},"title":"How to Turn IT From a Hindrance Into an Asset","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Apr 3, 2023","dateGMT":"2023-04-03 13:23:03","modifiedDate":"2023-04-08 00:15:31","modifiedDateGMT":"2023-04-08 00:15:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":17},"status":"publish","excerpt":"How do you turn IT from a hindrance into an asset? What to expect of ChatGPT and Passwords? Why shouldn't IT frustrate you? Find out on Tech Talks Daily!"},{"id":543,"link":"https:\/\/www.korte.co\/2023\/03\/20\/dapper-data-the-role-of-data-analytics-in-identity-management\/","name":"dapper-data-the-role-of-data-analytics-in-identity-management","thumbnail":{"url":false,"alt":false},"title":"Dapper Data - The Role of Data Analytics in Identity Management","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Mar 20, 2023","dateGMT":"2023-03-20 15:16:25","modifiedDate":"2023-03-20 15:16:26","modifiedDateGMT":"2023-03-20 15:16:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":12},"status":"publish","excerpt":"What is the connection between data, identity management, and log files? Find out more with me on the Dapper Data Podcast."},{"id":509,"link":"https:\/\/www.korte.co\/2023\/02\/16\/podcast-cybersecurity-hot-takes-lastpass-isnt-the-problem\/","name":"podcast-cybersecurity-hot-takes-lastpass-isnt-the-problem","thumbnail":{"url":false,"alt":false},"title":"Podcast: Cybersecurity Hot Takes: LastPass Isn't the Problem","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Feb 16, 2023","dateGMT":"2023-02-16 14:52:08","modifiedDate":"2023-02-21 14:57:21","modifiedDateGMT":"2023-02-21 14:57:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":17},"status":"publish","excerpt":"In a world where password management systems aren't secure, what should we do about logging in? Explore Single Sign On, Multi-Factor authentication, and the vision of a Passwordless future."},{"id":504,"link":"https:\/\/www.korte.co\/2023\/02\/13\/podcast-the-open-source-advantage-univention-on-building-a-company-around-open-source\/","name":"podcast-the-open-source-advantage-univention-on-building-a-company-around-open-source","thumbnail":{"url":false,"alt":false},"title":"Podcast: The Open Source Advantage - Univention on Building a Company Around Open Source","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Feb 13, 2023","dateGMT":"2023-02-13 14:14:44","modifiedDate":"2023-02-14 14:14:59","modifiedDateGMT":"2023-02-14 14:14:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":27},"status":"publish","excerpt":"Building out technology infrastructure for many companies is a huge challenge. Take a dive into it with the FUTR podcast."},{"id":492,"link":"https:\/\/www.korte.co\/2023\/01\/27\/podcast-using-open-source-linux-based-software-for-identity-management\/","name":"podcast-using-open-source-linux-based-software-for-identity-management","thumbnail":{"url":false,"alt":false},"title":"Podcast: Using Open Source Linux-based Software for Identity Management","author":{"name":"Kevin","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jan 27, 2023","dateGMT":"2023-01-27 15:17:51","modifiedDate":"2023-01-30 15:27:26","modifiedDateGMT":"2023-01-30 15:27:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":26},"status":"publish","excerpt":"Usernames and Passwords are the cornerstones of identity management. What is the future for schools and workplaces? Find out!"}]