Podcasting is an incredible way of reaching out to new people and being challenged to think in new ways. I’ve had the pleasure to appear with some of the greatest podcasters in technology and Business.
[{"id":1220,"link":"https:\/\/www.korte.co\/2025\/08\/06\/your-business-your-next-level-discover-the-secrets-to-leading-high-performing-distributed-teams\/","name":"your-business-your-next-level-discover-the-secrets-to-leading-high-performing-distributed-teams","thumbnail":{"url":false,"alt":false},"title":"Your Business - Your Next Level: Discover the Secrets to Leading High-Performing Distributed Teams","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Aug 6, 2025","dateGMT":"2025-08-07 04:46:34","modifiedDate":"2025-08-06 21:46:36","modifiedDateGMT":"2025-08-07 04:46:36","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/leadership\/' rel='post_tag'>Leadership<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":1,"sec":29},"status":"publish","excerpt":"Unlock the secrets to leading high-performing global teams with trust, clarity, and real results on the \"Your Business - Your Next Level\" podcast."},{"id":1210,"link":"https:\/\/www.korte.co\/2025\/07\/31\/reflections-on-leadership-entrepreneurship-and-open-source\/","name":"reflections-on-leadership-entrepreneurship-and-open-source","thumbnail":{"url":false,"alt":false},"title":"Reflections on Leadership, Entrepreneurship, and Open Source","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 31, 2025","dateGMT":"2025-07-31 19:32:00","modifiedDate":"2025-07-30 22:39:38","modifiedDateGMT":"2025-07-31 05:39:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/ai\/\" rel=\"category tag\">AI<\/a>, <a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/ai\/\" rel=\"category tag\">AI<\/a> <a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/ai\/' rel='post_tag'>AI<\/a><a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/current-thoughts\/' rel='post_tag'>Current Thoughts<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/leadership\/' rel='post_tag'>Leadership<\/a><a href='https:\/\/www.korte.co\/tag\/mediamentions\/' rel='post_tag'>MediaMentions<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":1,"sec":28},"status":"publish","excerpt":"Leadership, entrepreneurship, and open source insights\u2014my Deep Wealth Podcast interview explores purpose, digital sovereignty, and building strong teams."},{"id":1108,"link":"https:\/\/www.korte.co\/2025\/03\/17\/podcast-appearance-how-investors-evaluate-sales\/","name":"podcast-appearance-how-investors-evaluate-sales","thumbnail":{"url":false,"alt":false},"title":"Podcast Appearance: How Investors Evaluate Sales","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Mar 17, 2025","dateGMT":"2025-03-18 01:31:00","modifiedDate":"2025-03-19 06:40:32","modifiedDateGMT":"2025-03-19 13:40:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>, <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a> <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/current-thoughts\/' rel='post_tag'>Current Thoughts<\/a><a href='https:\/\/www.korte.co\/tag\/mediamentions\/' rel='post_tag'>MediaMentions<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":31},"status":"publish","excerpt":"What do investors look for when evaluating the sales of a company. Find out in my latest podcast appearance on the BreezeDocs podcast with Mark Shriner."},{"id":1006,"link":"https:\/\/www.korte.co\/2024\/09\/15\/podcast-listening-with-leaders\/","name":"podcast-listening-with-leaders","thumbnail":{"url":false,"alt":false},"title":"Podcast: Listening with Leaders","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Sep 15, 2024","dateGMT":"2024-09-15 23:45:43","modifiedDate":"2024-09-15 16:45:45","modifiedDateGMT":"2024-09-15 23:45:45","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/leadership\/' rel='post_tag'>Leadership<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":18},"status":"publish","excerpt":"I had the great pleasure of discussing listening to founders and the decorum in the board room with Doug Noll on Listening with Leaders."},{"id":641,"link":"https:\/\/www.korte.co\/2023\/07\/29\/tech-main-presents-cybersecurity-as-organizational-asset\/","name":"tech-main-presents-cybersecurity-as-organizational-asset","thumbnail":{"url":false,"alt":false},"title":"Tech & Main Presents: Cybersecurity As Organizational Asset","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 29, 2023","dateGMT":"2023-07-29 13:14:00","modifiedDate":"2023-07-28 16:28:55","modifiedDateGMT":"2023-07-28 23:28:55","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/mediamentions\/' rel='post_tag'>MediaMentions<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":14},"status":"publish","excerpt":"I was happy to discuss cybersecurity, identity management, and the intersection of emotions and technology with\u00a0Shaun St.Hill, on the Tech & Main podcast."},{"id":635,"link":"https:\/\/www.korte.co\/2023\/07\/24\/podcast-in-systems-we-trust\/","name":"podcast-in-systems-we-trust","thumbnail":{"url":false,"alt":false},"title":"Podcast: In Systems We Trust","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 24, 2023","dateGMT":"2023-07-24 13:28:37","modifiedDate":"2023-07-24 13:28:37","modifiedDateGMT":"2023-07-24 13:28:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":13},"status":"publish","excerpt":"Tune in now to \"In Systems We Trust\" to get a unique take on identity management and why the human component can't be seen as separate from the IT-System."},{"id":628,"link":"https:\/\/www.korte.co\/2023\/07\/17\/unriveted-tales-of-digital-transformation-and-cyber-security\/","name":"unriveted-tales-of-digital-transformation-and-cyber-security","thumbnail":{"url":false,"alt":false},"title":"Unriveted: Tales of Digital Transformation and Cyber Security","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jul 17, 2023","dateGMT":"2023-07-17 17:52:40","modifiedDate":"2023-07-17 17:52:40","modifiedDateGMT":"2023-07-17 17:52:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/it-governance\/\" rel=\"category tag\">IT Governance<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/digital-transformation\/' rel='post_tag'>Digital Transformation<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":24},"status":"publish","excerpt":"Join me on this week's Unriveted Podcast, where hosts\u00a0Martin Miller\u00a0and\u00a0John Sukup\u00a0ask the hard questions: \"What is your credit card number?\""},{"id":602,"link":"https:\/\/www.korte.co\/2023\/06\/01\/podcast-msp-initiative-live-with-kevin-dominik-korte-from-univention\/","name":"podcast-msp-initiative-live-with-kevin-dominik-korte-from-univention","thumbnail":{"url":false,"alt":false},"title":"Podcast: MSP INITIATIVE LIVE WITH KEVIN DOMINIK KORTE FROM UNIVENTION","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Jun 1, 2023","dateGMT":"2023-06-01 23:40:01","modifiedDate":"2023-06-01 23:40:02","modifiedDateGMT":"2023-06-01 23:40:02","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>, <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a> <a href=\"https:\/\/www.korte.co\/category\/video\/\" rel=\"category tag\">Video<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a><a href='https:\/\/www.korte.co\/tag\/video\/' rel='post_tag'>Video<\/a>"},"readTime":{"min":0,"sec":38},"status":"publish","excerpt":"MSPs are important partners for us at Univention. Today, I enjoyed discussing Identity Management with George Bardissi of the MSP Initiative."},{"id":587,"link":"https:\/\/www.korte.co\/2023\/05\/12\/podcast-a-geek-leader-311-identity-management\/","name":"podcast-a-geek-leader-311-identity-management","thumbnail":{"url":false,"alt":false},"title":"Podcast: A Geek Leader 311: Identity Management","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"May 12, 2023","dateGMT":"2023-05-12 23:36:00","modifiedDate":"2023-05-15 12:43:59","modifiedDateGMT":"2023-05-15 12:43:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":25},"status":"publish","excerpt":"Leadership is often defined as inspiring people to do the right thing. Listening, to people is as important for inspiration as saying the right words."},{"id":563,"link":"https:\/\/www.korte.co\/2023\/04\/12\/podcast-a-rollercoaster-on-the-jason-cavness-experience\/","name":"podcast-a-rollercoaster-on-the-jason-cavness-experience","thumbnail":{"url":false,"alt":false},"title":"Podcast: A Rollercoaster on The Jason Cavness Experience","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Apr 12, 2023","dateGMT":"2023-04-12 13:41:14","modifiedDate":"2023-04-12 13:41:15","modifiedDateGMT":"2023-04-12 13:41:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a>, <a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/current-thoughts\/\" rel=\"category tag\">Current Thoughts<\/a> <a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/leadership\/\" rel=\"category tag\">Leadership<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/board\/' rel='post_tag'>Board<\/a><a href='https:\/\/www.korte.co\/tag\/current-thoughts\/' rel='post_tag'>Current Thoughts<\/a><a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":35},"status":"publish","excerpt":"From Model trains to Open-source, Gardening to Sailing the Atlantic, and Cybersecurity to being a Dad, Jason Cavness takes a dive into all aspects that make me."},{"id":554,"link":"https:\/\/www.korte.co\/2023\/04\/03\/podcast-how-to-turn-it-from-a-hindrance-into-an-asset\/","name":"podcast-how-to-turn-it-from-a-hindrance-into-an-asset","thumbnail":{"url":false,"alt":false},"title":"How to Turn IT From a Hindrance Into an Asset","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Apr 3, 2023","dateGMT":"2023-04-03 13:23:03","modifiedDate":"2023-04-08 00:15:31","modifiedDateGMT":"2023-04-08 00:15:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":17},"status":"publish","excerpt":"How do you turn IT from a hindrance into an asset? What to expect of ChatGPT and Passwords? Why shouldn't IT frustrate you? Find out on Tech Talks Daily!"},{"id":543,"link":"https:\/\/www.korte.co\/2023\/03\/20\/dapper-data-the-role-of-data-analytics-in-identity-management\/","name":"dapper-data-the-role-of-data-analytics-in-identity-management","thumbnail":{"url":false,"alt":false},"title":"Dapper Data - The Role of Data Analytics in Identity Management","author":{"name":"Kevin Korte","link":"https:\/\/www.korte.co\/author\/kevin\/"},"date":"Mar 20, 2023","dateGMT":"2023-03-20 15:16:25","modifiedDate":"2023-03-20 15:16:26","modifiedDateGMT":"2023-03-20 15:16:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a>, <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>","space":"<a href=\"https:\/\/www.korte.co\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.korte.co\/category\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/www.korte.co\/category\/media-mention\/podcast\/\" rel=\"category tag\">Podcast<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.korte.co\/tag\/cybersecurity\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/www.korte.co\/tag\/it\/' rel='post_tag'>IT<\/a><a href='https:\/\/www.korte.co\/tag\/podcast\/' rel='post_tag'>Podcast<\/a>"},"readTime":{"min":0,"sec":12},"status":"publish","excerpt":"What is the connection between data, identity management, and log files? Find out more with me on the Dapper Data Podcast."}]
