Player FM - Internet Radio Done Right
Checked 1+ y ago
הוסף לפני six שנים
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות
S
Species Unite


1 Jeff Kerr: Our First Amendment Right to Receive Communications (from Monkeys) 30:14
30:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי30:14
"It is a scientific fact that these macaques, like all other primates, including humans, are communicating. They communicate in much the same way we do - facial expressions, vocalizations, body postures, those kinds of things." - Jeff Kerr Jeff Kerr is PETA foundations Chief Legal Officer. I asked him to come on the show to talk about one of PETA’s current lawsuits against the National Institutes of Health (NIH) and Nathional Institute of Mental Health (NIMH). PETA is arguing that the monkeys being tested on in a government run facility are capable of communication (or “are communicating”). And that we have a constitutional right under the First Amendment to receive their communications. This could be a game changer in allowing us to see what’s really going on in labs that are funded by taxpayer money, and which have so far been censored from public view. PETA’s lawsuit follows years of NIH’s attempts to deny Freedom of Information requests banning PETA executives from its campus and illegally censoring animal advocates’ speech on NIH’s public social media pages. Through the lawsuit, PETA is seeking a live audio-visual feed to see and hear real-time communications from the macaques who have been kept isolated, used in fear experiments, and had posts cemented into their heads. Anthropologists and other scientists have studied macaque and other primate communications for decades and know that the monkeys communicate effectively and intentionally through lip smacking, fear grimaces, body language, and various cries and sounds—all of which constitute speech under the law. Primatologists can analyze that speech on a deeper level to share their stories with the world.…
How to build an insider threat program in your organization.
Manage episode 272561766 series 2547582
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
…
continue reading
35 פרקים
Manage episode 272561766 series 2547582
תוכן מסופק על ידי ManageEngine ADSolutions. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי ManageEngine ADSolutions או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
…
continue reading
35 פרקים
כל הפרקים
×M
ManageEngine’s Weekly IT Security Podcast series.

1 How to reduce the risk of insider threats with identity and access management 13:46
13:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי13:46
In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.…
In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.
M
ManageEngine’s Weekly IT Security Podcast series.

In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 Log management requirements for complying with the PCI DSS 14:37
14:37
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:37
Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Dealing with advanced persistent threats (APTs) 12:32
12:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:32
In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.
M
ManageEngine’s Weekly IT Security Podcast series.

1 People who are essential for a next-gen SOC. 12:17
12:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:17
In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.
In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.
M
ManageEngine’s Weekly IT Security Podcast series.

1 How to build an insider threat program in your organization. 12:49
12:49
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי12:49
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
M
ManageEngine’s Weekly IT Security Podcast series.

In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.
M
ManageEngine’s Weekly IT Security Podcast series.

1 How to defend against ransomware attacks 14:53
14:53
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:53
In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.…
M
ManageEngine’s Weekly IT Security Podcast series.

1 Efficient hybrid identity protection: two is better than one 11:09
11:09
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי11:09
Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Efficient hybrid identity management: Breaking down passwords (Part 1) 11:50
11:50
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי11:50
In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Getting started with file security 15:15
15:15
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי15:15
In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.
M
ManageEngine’s Weekly IT Security Podcast series.

1 Tips to overcome cybersecurity challenges while working from home. 14:55
14:55
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי14:55
With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.
M
ManageEngine’s Weekly IT Security Podcast series.

1 The biggest challenges IT administrators face during a crisis 21:11
21:11
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי21:11
IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.…
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.