4/2/08

The Rapidly Changing World of Security: A Talk...

***Editor's Note: Get up-to-speed on the strengths and weaknesses of today's identity architecture and the tools you'll need to secure identity and access for tomorrow by signing up for this webinar. Listen to or download the 11:06 minute podcast below: Download file What follows is a transcript of my discussion with John Shaw,<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://www.ebizq.net/blogs/news_security">Twenty-Four Seven Security - ebizQ</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fwww.ebizq.net%2Fblogs%2Fnews_security" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 29 links from 17 sites</a>) <br /><br /><img width="1" height="1" src="http://static.technorati.com/y/580048145.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wxfGh0dHA6Ly93d3cuZWJpenEubmV0L2Jsb2dzL25ld3Nfc2VjdXJpdHkvMjAwOC8wNC9yYXBpZGx5X2NoYW5naW5nX3dvcmxkX29mX3NlY3UucGhwJnZpc2l0b3JpZD0tJnVzZXJpZD0tJnNlc3Npb25pZD1jZGNmODZhMGMyODk4NzQ0MzQ4NmViY2VhZTE1ZDM4ZSZ1c2VyY2xhc3M9MSZhYmNsYXNzPWImYWJzd2l0Y2g9ZiZtZW1iZXI9LQ=="/>