Player FM - Internet Radio Done Right
Checked 1y ago
הוסף לפני six שנים
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות
A
All About Change


1 Professional football player Jonathan Jones: Mentorship and Making an Impact in Your Community 22:49
22:49
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי22:49
Jonathan Jones is an NFL cornerback for the Washington Commanders who rose from the undrafted ranks to become two-time Super Bowl champion with the New England Patriots, a businessman, philanthropist, and licensed pilot. In 2019, Jonathan founded the Jonathan Jones Next Step Foundation in 2019, a platform dedicated to empowering youth through education, professional development, and mentorship. The foundation works to alleviate food insecurity, promote women in stem and sports, and to promote professional development in the communities where he lives. Jay and Jonathan talk about investing in the communities they live in, acknowledging the people who helped you become the person you are, and paying that same investment forward to the next generation. Episode Chapters 0:00 intro 1:24 Building local connections 4:25 Jonathan’s mentors and mentees 10:54 Jonathan’s pride in his mentees’ successes 13:04 how Jonathan chooses his causes 14:08 Jonathan’s support for girls and young women 17:19: Jonathan’s passion for flying 19:40 The Next Step Foundation 20:29 Goodbye For video episodes, watch on www.youtube.com/@therudermanfamilyfoundation Stay in touch: X: @JayRuderman | @RudermanFdn LinkedIn: Jay Ruderman | Ruderman Family Foundation Instagram: All About Change Podcast | Ruderman Family Foundation To learn more about the podcast, visit https://allaboutchangepodcast.com/ Looking for more insights into the world of activism? Be sure to check out Jay’s brand new book, Find Your Fight , in which Jay teaches the next generation of activists and advocates how to step up and bring about lasting change. You can find Find Your Fight wherever you buy your books, and you can learn more about it at www.jayruderman.com .…
Active Directory baselines - Must have security reports
Manage episode 244833590 series 2547582
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD.
…
continue reading
35 פרקים
Manage episode 244833590 series 2547582
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD.
…
continue reading
35 פרקים
כל הפרקים
×
1 How to reduce the risk of insider threats with identity and access management 13:46
13:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי13:46
In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.…
In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.
In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.…

1 Log management requirements for complying with the PCI DSS 14:37
14:37
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:37
Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance.

1 Dealing with advanced persistent threats (APTs) 12:32
12:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:32
In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.

1 People who are essential for a next-gen SOC. 12:17
12:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:17
In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.
In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.

1 How to build an insider threat program in your organization. 12:49
12:49
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:49
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.

1 How to defend against ransomware attacks 14:53
14:53
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:53
In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.…

1 Efficient hybrid identity protection: two is better than one 11:09
11:09
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי11:09
Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure.

1 Efficient hybrid identity management: Breaking down passwords (Part 1) 11:50
11:50
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי11:50
In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.

1 Getting started with file security 15:15
15:15
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי15:15
In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.

1 Tips to overcome cybersecurity challenges while working from home. 14:55
14:55
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:55
With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.

1 The biggest challenges IT administrators face during a crisis 21:11
21:11
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:11
IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.…
M
ManageEngine’s Weekly IT Security Podcast series.

In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated attacks by monitoring the risk score of users and entities in your network.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 Three important reports for Active Directory admins 13:12
13:12
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי13:12
In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Why securing your Active Directory is the key component of IT Security? 17:09
17:09
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי17:09
In this episode, Hary explains why your Active Directory should be secure as it is the gateway to your organization. He also explains why setting the permissions required is the best way to ensure control.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Active Directory Group Policy Dos and Don'ts 12:26
12:26
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:26
In our very first podcast, Vivin explains in detail about the best practices, dos and don'ts when it comes to dealing with Active Directory Group Policy.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Latest challenges and trends in security monitoring 14:05
14:05
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:05
In this episode, Sid talks about the growing threats posed by malicious entities today. He also explains how a SIEM solution can assist in beefing up the security posture of an organization.
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.