Player FM - Internet Radio Done Right
Checked 1+ y ago
تمت الإضافة منذ قبل six عام
المحتوى المقدم من ManageEngine ADSolutions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة ManageEngine ADSolutions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
A
Accidental CEO Podcast


1 72: If You Want to Grow—Stop Fixing the Wrong Problem 16:32
16:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب16:32
You’re busy—but are you actually growing? In this episode, Nata Salvatori exposes a trap that’s costing service providers time, money, and sanity: chasing busywork that feels productive but doesn’t move the needle. She walks through a clear, five-step growth path—from clarifying your offer, validating through real sales, delivering sustainably, building repeatable systems, to scaling confidently. You’ll learn: How to spot and ditch “fake work” Why clarity beats complexity every time How to use real feedback to validate your offers Delivery tips that prevent burnout System creation that enables scaling How to honor your current phase of growth 📌 Ready to stop spinning your wheels and make real moves? Map your phase, pick your next action, and don’t be afraid to ask for help: 👉 accidentalceo.co/coaching Support the show…
ManageEngine’s Weekly IT Security Podcast series.
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2547582
المحتوى المقدم من ManageEngine ADSolutions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة ManageEngine ADSolutions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
35 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2547582
المحتوى المقدم من ManageEngine ADSolutions. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة ManageEngine ADSolutions أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
35 حلقات
Alle afleveringen
×
1 How to reduce the risk of insider threats with identity and access management 13:46
13:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب13:46
In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.…

1 The need for HR-driven identity management 6:15
6:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب6:15
In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.

1 How to use threat intelligence for effective security analytics. 9:53
9:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب9:53
In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.…

1 Log management requirements for complying with the PCI DSS 14:37
14:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:37
Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance.

1 Dealing with advanced persistent threats (APTs) 12:32
12:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب12:32
In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.

1 People who are essential for a next-gen SOC. 12:17
12:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب12:17
In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.
In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.

1 How to build an insider threat program in your organization. 12:49
12:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب12:49
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.

1 How to defend against ransomware attacks 14:53
14:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:53
In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.…

1 Efficient hybrid identity protection: two is better than one 11:09
11:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:09
Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure.

1 Efficient hybrid identity management: Breaking down passwords (Part 1) 11:50
11:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:50
In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.
In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.

1 Tips to overcome cybersecurity challenges while working from home. 14:55
14:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:55
With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.

1 The biggest challenges IT administrators face during a crisis 21:11
21:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب21:11
IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 Expert Tech Talk Podcast series feat. The Monopoly Man - Part 2 11:46
11:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:46
In the final episode of our two-part Expert Tech-Talk podcast series, the Monopoly Man discusses the significance of the CCPA, the consequences of a data breach and why organizations must be careful while protecting user data.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Expert Tech Talk Podcast series feat. The Monopoly Man - Part 1 14:11
14:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:11
Ian Madrigal, also known as the, 'Monopoly Man', joins Sid, in our Expert Tech-Talk podcast series. Listen to their take on the importance of data privacy in today's times, and why companies should be doing more to protect user data.
M
ManageEngine’s Weekly IT Security Podcast series.

1 The role of threat intelligence in SIEM 11:23
11:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:23
In this week's episode, Sid discusses the role of threat intelligence in enhancing the capabilities of a SIEM. Find out how threat intelligence assists in detecting, investigating, and responding to attacks using the documented knowledge of known malicious threats around the globe, and much more.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Privileged attacks in Active Directory 14:17
14:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:17
In this episode, you can learn in detail about two complex attacks - the admin count and DC shadow attack on an Active Directory environment. Tune in to discover how they happen, and why it's necessary for you to have solutions in place to detect them.
M
ManageEngine’s Weekly IT Security Podcast series.

M
ManageEngine’s Weekly IT Security Podcast series.

1 6 SIEM concepts every security admin must know 16:44
16:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب16:44
M
ManageEngine’s Weekly IT Security Podcast series.

M
ManageEngine’s Weekly IT Security Podcast series.

M
ManageEngine’s Weekly IT Security Podcast series.

1 Detecting security threats at multiple layers using an SIEM solution 11:04
11:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:04
M
ManageEngine’s Weekly IT Security Podcast series.

In our first co-hosted podcast, Vivin and Sid explain the five important steps to secure the data in your IT environment.
M
ManageEngine’s Weekly IT Security Podcast series.

In this episode, Harish explains why data security is of paramount importance. Tune in as he highlights how data protection can be improved while also underlining the growing importance on data security due to compliance mandates like the GDPR.
M
ManageEngine’s Weekly IT Security Podcast series.

1 How does a SIEM solution help in responding to security incidents? 12:06
12:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب12:06
In this podcast, Sid explains how an SIEM solution helps in responding to security incidents. Tune in as he explains the different types of alerts which can be configured based on the severity of the incident, the importance of integrating an SIEM solution to a centralized help desk tool and the benefits of automated response workflows.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 The security landscape as we near 2020. 11:49
11:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب11:49
With 2020 fast approaching, Derek Melber, AD MVP, examines the security landscape and highlights crucial areas where you need to focus your security strategy. Tune in as he shares his expert take on monitoring privileges, constantly monitoring service accounts, password policy and much more.
M
ManageEngine’s Weekly IT Security Podcast series.

A combination of weak authentication protocols and the use of easy-to-guess passwords have led to numerous security breaches. Derek Melber, AD MVP, shares his take on the importance of strong passwords, best practices of password policy, and much more in this episode.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Active Directory baselines - Must have security reports 19:39
19:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب19:39
In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD.
M
ManageEngine’s Weekly IT Security Podcast series.

In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated attacks by monitoring the risk score of users and entities in your network.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 Three important reports for Active Directory admins 13:12
13:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب13:12
In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Why securing your Active Directory is the key component of IT Security? 17:09
17:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب17:09
In this episode, Hary explains why your Active Directory should be secure as it is the gateway to your organization. He also explains why setting the permissions required is the best way to ensure control.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Active Directory Group Policy Dos and Don'ts 12:26
12:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب12:26
In our very first podcast, Vivin explains in detail about the best practices, dos and don'ts when it comes to dealing with Active Directory Group Policy.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Latest challenges and trends in security monitoring 14:05
14:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب14:05
In this episode, Sid talks about the growing threats posed by malicious entities today. He also explains how a SIEM solution can assist in beefing up the security posture of an organization.
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.