35 episodes

Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can!

We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.

ManageEngine’s Weekly IT Security Podcast series‪.‬ ManageEngine

    • Technology
    • 3.5 • 2 Ratings

Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can!

We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.

    How to reduce the risk of insider threats with identity and access management

    How to reduce the risk of insider threats with identity and access management

    In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.

    • 13 min
    The need for HR-driven identity management

    The need for HR-driven identity management

    In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.

    • 6 min
    How to use threat intelligence for effective security analytics.

    How to use threat intelligence for effective security analytics.

    In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.

    • 9 min
    Log management requirements for complying with the PCI DSS

    Log management requirements for complying with the PCI DSS

    Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance.

    • 14 min
    Dealing with advanced persistent threats (APTs)

    Dealing with advanced persistent threats (APTs)

    In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.

    • 12 min
    People who are essential for a next-gen SOC.

    People who are essential for a next-gen SOC.

    In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.

    • 12 min

Customer Reviews

3.5 out of 5
2 Ratings

2 Ratings

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
Recode & The Verge
Gregg Phillips