These postings are provided "AS IS" with no warranties, and confers no rights. You assume all risk for your use.
Chris Di LulloSr. IT Pro Marketing ManagerTwitter | LinkedIn
Jonathan RozenblitTechnology AdvisorMicrosoft Canada
Stephen IbarakiIndustry AnalystFCIPS, I.S.P., ITCP/IP3P, DFNPA, CNP, FGITCA, MVP
There seems to be a story in the news every day about a company whose computer systems have been breached and client information has been leaked. It's every IT manager's worst fear. This month's podcast from the IT Manager Podcast Series has industry experts discussing the reasons security policies can fail, how to protect the application layer and what "defense in depth" really means. Bruce, Rob and Brian have lots of interesting insights to share.
I'll be taking over as the host of this series and so Barnaby and I co-host this particular episode. This was my first time in the recording studio and it was quite fun, although hearing my own voice is a little disconcerting. Is there anyone that actually likes listening to the sound of their own voice?
This interview is available in both mp3 and wma formats. For more information on the series, check out the IT Manager Podcast web page.