Last week we kicked off a series of shows focused on the many aspects of Security as it relates to containers, Kubernetes, applications and the end-to-end management of applications. The first part of the series was Eps.14, where we looked at Container Hosts, Registries, Application Content and Application Build Pipelines.
This week we sat down with Marc Boorshtein (Co-Founder/CTO of Tremolo Security) to discuss Identity Management, Authentication and Authorization in a Kubernetes world. Marc gave us great insight into the variety of options available to developers, operators and security teams, as well as providing some insight into the pros and cons of each approach.
The show will always be available on this blog (search: #PodCTL), as well as RSS Feeds, iTunes, Google Play, SoundCloud, Stitcher, TuneIn and all your favorite podcast players.
About the author
Browse by channel
Automation
The latest on IT automation that spans tech, teams, and environments
Artificial intelligence
Explore the platforms and partners building a faster path for AI
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
Explore how we reduce risks across environments and technologies
Edge computing
Updates on the solutions that simplify infrastructure at the edge
Infrastructure
Stay up to date on the world’s leading enterprise Linux platform
Applications
The latest on our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Developer resources
- Customer support
- Red Hat value calculator
- Red Hat Ecosystem Catalog
- Find a partner
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit