API Security and PKI - Anusha Iyer, Corsha
Techstrong TV Interviews
•
01-Jan-1900
Today, API secrets like keys, tokens and certificates are used as a way to identify machines and broker access between them, but these static secrets are often shared, rarely rotated and are being leaked in CI pipelines, logs and code repositories at an alarming rate. Anusha Iyer discusses why PKI doesn't cut it.
Want more TSTV interviews? Click here.
Up Next in Techstrong TV Interviews
-
Securing Digital Presence - Zack Gano...
Senior executives, high-profile business leaders and other key personnel have a significant online digital presence. The goal, therefore, is to protect online accounts from being targeted for weaknesses. Zack Ganot of Sunday Security and Charlene discuss what organizations must do to keep their e...
-
Kalix and Akka - Brad Murdoch, Lightbend
The talents required to create large-scale, highly distributed, low latency cloud-native applications are usually limited to organizations like Apple, Telsa and the Metas of the world. Akka, an open source application framework used for such applications, is one of the more complex and challengin...
-
Wrap-Up | KubeCon Europe 2022
As KubeCon + CloudNativeCon Europe 2022 wraps up, Techstrong Group CEO Alan Shimel and CTO Mitch Ashley reflect on some of this event's news and announcements.
Want more TSTV interviews? Click here.