<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/manageengine-s-weekly-it-security-podcast-series" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>ManageEngine’s Weekly IT Security  Podcast series.</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/manageengine-s-weekly-it-security-podcast-series</itunes:new-feed-url>
    <description>Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can!

We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.</description>
    <copyright>© 2019 Zoho Corporation Pvt. Ltd.</copyright>
    <podcast:guid>5194642a-c0d5-5110-80c6-ef32ed3e9a90</podcast:guid>
    <podcast:locked owner="adsolutions-events@manageengine.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Sat, 10 Feb 2024 01:32:15 +0530</pubDate>
    <lastBuildDate>Wed, 03 Dec 2025 01:56:18 +0530</lastBuildDate>
    <image>
      <url>https://img.transistor.fm/dwkLAtlobg3mBLfxG6IgJk6g1EoZAqpOdnIA73tnN4Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM5ODgvMTU2NzU5/ODY5MC1hcnR3b3Jr/LmpwZw.jpg</url>
      <title>ManageEngine’s Weekly IT Security  Podcast series.</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>ManageEngine</itunes:author>
    <itunes:image href="https://img.transistor.fm/dwkLAtlobg3mBLfxG6IgJk6g1EoZAqpOdnIA73tnN4Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM5ODgvMTU2NzU5/ODY5MC1hcnR3b3Jr/LmpwZw.jpg"/>
    <itunes:summary>Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can!

We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.</itunes:summary>
    <itunes:subtitle>Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can.</itunes:subtitle>
    <itunes:keywords>Active Directory, IT Security, AD, Group Policy, Admin</itunes:keywords>
    <itunes:owner>
      <itunes:name>ManageEngine ADSolutions</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>How to reduce the risk of insider threats with identity and access management</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>How to reduce the risk of insider threats with identity and access management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a9d2505b-5948-4b88-9c3b-d587f43dd04e</guid>
      <link>https://share.transistor.fm/s/1cc7b2f4</link>
      <description>
        <![CDATA[In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.]]>
      </description>
      <content:encoded>
        <![CDATA[In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.]]>
      </content:encoded>
      <pubDate>Thu, 29 Apr 2021 18:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/1cc7b2f4/1491d6b3.mp3" length="13374496" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/BHmyNR2Gnwxy-ZGxxac5-Hix0WO6wym4XUvvIPLmDB0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzUyODIwOC8x/NjE5NTQwNDc0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>826</itunes:duration>
      <itunes:summary>In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.</itunes:summary>
      <itunes:subtitle>In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types</itunes:subtitle>
      <itunes:keywords>IAM, Identity and Access Management, Just-in-time, Zero trust, IAM solution, insider threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The need for HR-driven identity management</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>The need for HR-driven identity management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bea33601-fd60-4b77-a9c4-7ea67b0d61b5</guid>
      <link>https://share.transistor.fm/s/8a027b58</link>
      <description>
        <![CDATA[In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.]]>
      </content:encoded>
      <pubDate>Tue, 20 Apr 2021 20:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/8a027b58/d367e437.mp3" length="6157318" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/SWGWDAhRStrsNeWTd5Ln3K3M9rtvDtN2N0UJIHFpSgQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzUyMTM1Ni8x/NjE4ODQwNzAyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>375</itunes:duration>
      <itunes:summary>In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.</itunes:summary>
      <itunes:subtitle>In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce co</itunes:subtitle>
      <itunes:keywords>IAM, HR driven IAM, Identity and Access Management, ManageEngine podcast, Hybrid AD</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to use threat intelligence for effective security analytics.</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>How to use threat intelligence for effective security analytics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3032324-728f-42e1-a04e-be1cbf91060f</guid>
      <link>https://share.transistor.fm/s/5d157751</link>
      <description>
        <![CDATA[In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.]]>
      </description>
      <content:encoded>
        <![CDATA[In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.]]>
      </content:encoded>
      <pubDate>Tue, 06 Apr 2021 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/5d157751/c27a70f3.mp3" length="9541211" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/TLddojAqdWElgLQn_KL0iUYWomr2w5HhEJSKdjQTYsI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzUwNjg1MC8x/NjE3MzU3MDYwLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>593</itunes:duration>
      <itunes:summary>In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.</itunes:summary>
      <itunes:subtitle>In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelli</itunes:subtitle>
      <itunes:keywords>Threat intelligence, SIEM, how to prevent malicious threats, ManageEngine, Log360, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Log management requirements for complying with the PCI DSS</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Log management requirements for complying with the PCI DSS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d96c397-8341-46df-bfe9-37c7058312b6</guid>
      <link>https://share.transistor.fm/s/0965e3d6</link>
      <description>
        <![CDATA[Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance. ]]>
      </description>
      <content:encoded>
        <![CDATA[Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance. ]]>
      </content:encoded>
      <pubDate>Wed, 23 Dec 2020 19:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/0965e3d6/aa38f492.mp3" length="14254576" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/U9R_0eOMBxiJDYD0xXPTFThDS-Z9pKN2PcIZMKDytBE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzQyNjQ5MC8x/NjA4NjUxMDE0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>877</itunes:duration>
      <itunes:summary>Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance. </itunes:summary>
      <itunes:subtitle>Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in c</itunes:subtitle>
      <itunes:keywords>PCI DSS, SIEM, IT Security, Compliance, Log management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dealing with advanced persistent threats (APTs)</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Dealing with advanced persistent threats (APTs)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">551893c8-ffdd-41f7-995e-20ebabac10f4</guid>
      <link>https://share.transistor.fm/s/eb812dd9</link>
      <description>
        <![CDATA[In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.]]>
      </content:encoded>
      <pubDate>Thu, 10 Dec 2020 18:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/eb812dd9/bf5f0ac0.mp3" length="12254516" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/0dmD-1mkNpasImG0gHDu99EVIe703GZxQXL8_dQp6Hg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzQxNzk5OS8x/NjA3NTIzMTM0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>752</itunes:duration>
      <itunes:summary>In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.</itunes:summary>
      <itunes:subtitle>In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persiste</itunes:subtitle>
      <itunes:keywords>IT Security, SIEM, Log360, APT, APTs, Advanced persistent threats, threat hunting, UEBA, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>People who are essential for a next-gen SOC.</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>People who are essential for a next-gen SOC.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ab5452a-f6a1-42e1-b6d9-358bea38159d</guid>
      <link>https://share.transistor.fm/s/872fdcd4</link>
      <description>
        <![CDATA[In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.]]>
      </content:encoded>
      <pubDate>Fri, 20 Nov 2020 16:03:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/872fdcd4/357006c2.mp3" length="23668998" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/3cFZEQByBb-Gm4bzao6RfMOMs4tc4EAGmKGzvxpFpc0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzQwNDQ4OS8x/NjA1NzY2ODQyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>737</itunes:duration>
      <itunes:summary>In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.</itunes:summary>
      <itunes:subtitle>In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial re</itunes:subtitle>
      <itunes:keywords>SOC, cybersecurity, data breach, ManageEngine Log360, SIEM, next-generation SOC, SOC team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Recent cyberattacks during the pandemic</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Recent cyberattacks during the pandemic</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">915276dd-a922-42ce-afac-187e60b2dfad</guid>
      <link>https://share.transistor.fm/s/f73a6646</link>
      <description>
        <![CDATA[In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.]]>
      </content:encoded>
      <pubDate>Mon, 28 Sep 2020 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/f73a6646/eefbeb36.mp3" length="8983077" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/X2QSwwO0E259CbKaW1kfu4yQXb8pICikjhm9JioBbaI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzM1NDc4Ny8x/NjAwNjc4MjA4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>372</itunes:duration>
      <itunes:summary>In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.</itunes:summary>
      <itunes:subtitle>In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.</itunes:subtitle>
      <itunes:keywords>cyberattacks, cyberattacks during Covid-19, biggest cyberattacks in 2020, Twitter breach, IT security, SIEM </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to build an insider threat program in your organization.</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>How to build an insider threat program in your organization.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c48dde2c-cc98-4ce7-b5c4-2b1e1b627f55</guid>
      <link>https://share.transistor.fm/s/6c2b1f4e</link>
      <description>
        <![CDATA[Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.]]>
      </description>
      <content:encoded>
        <![CDATA[Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.]]>
      </content:encoded>
      <pubDate>Mon, 21 Sep 2020 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/6c2b1f4e/09e0a734.mp3" length="18524717" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/wEfn0A7lZFlvibHzzVYeVY8fpqvBnQ8vpvBQNYAm9xc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzM1NDc4Mi8x/NjAwNjc2ODM3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.</itunes:summary>
      <itunes:subtitle>Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.</itunes:subtitle>
      <itunes:keywords>Insider threats, SIEM, Insider attacks, insider threat program, how to build a insider threat program</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero Trust in IAM</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Zero Trust in IAM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">53753816-65f3-48fe-9c34-218838f40902</guid>
      <link>https://share.transistor.fm/s/40bd6a35</link>
      <description>
        <![CDATA[In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.]]>
      </content:encoded>
      <pubDate>Tue, 25 Aug 2020 13:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/40bd6a35/b45a9e33.mp3" length="11865888" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/iLe6Hxw93b35XeZDfRLvXkiVcRkReuTI2ZxcX3j0eeo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzMyNzkxNy8x/NTk4MzM0MzExLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>494</itunes:duration>
      <itunes:summary>In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.</itunes:summary>
      <itunes:subtitle>In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.</itunes:subtitle>
      <itunes:keywords>Zero Trust model, Zero Trust in IAM, Identity and access management, IAM podcast, hybrid Active Directory</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to defend against ransomware attacks </title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>How to defend against ransomware attacks </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6882ec0a-a1b5-49b3-89c0-88b81cf2c8cf</guid>
      <link>https://share.transistor.fm/s/5de0a9aa</link>
      <description>
        <![CDATA[In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.]]>
      </content:encoded>
      <pubDate>Mon, 20 Jul 2020 14:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/5de0a9aa/88cc286e.mp3" length="21519677" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/dAL5y3xhW1Tm1haWv0aMHTydhJXM2teX0qQ3M6oRvH8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI5Nzc0Mi8x/NTk0OTkxNzk5LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>893</itunes:duration>
      <itunes:summary>In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.</itunes:summary>
      <itunes:subtitle>In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of you</itunes:subtitle>
      <itunes:keywords>Ransomware, security alert, SIEM, data loss prevention</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Efficient hybrid identity protection: two is better than one</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Efficient hybrid identity protection: two is better than one</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5b8a721-153f-4b8b-8930-ab3c42a5ff09</guid>
      <link>https://share.transistor.fm/s/36e40a96</link>
      <description>
        <![CDATA[Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure. ]]>
      </description>
      <content:encoded>
        <![CDATA[Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure. ]]>
      </content:encoded>
      <pubDate>Thu, 04 Jun 2020 18:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/36e40a96/565c244c.mp3" length="16133428" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/swOFg2vSEbjjCr2y2rZqvyBnwFZiJNf4YjCZxVNJqe4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI3MDU3Ni8x/NTkxMjY4MTM0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>669</itunes:duration>
      <itunes:summary>Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure. </itunes:summary>
      <itunes:subtitle>Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure. </itunes:subtitle>
      <itunes:keywords>Hybrid AD, hybrid Active Directory, MFA, ADSelfService Plus, AD360</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Efficient hybrid identity management: Breaking down passwords (Part 1)</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Efficient hybrid identity management: Breaking down passwords (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35596e74-6d17-4a6c-9902-d5221627d257</guid>
      <link>https://share.transistor.fm/s/4285face</link>
      <description>
        <![CDATA[In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.]]>
      </content:encoded>
      <pubDate>Tue, 26 May 2020 14:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/4285face/342aaf14.mp3" length="17110551" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/93Hm2Y_8w1aGOoNPltnRx7l41_zqOzatK3AHR34x964/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI2MjgxNi8x/NTkwMTM5MjkxLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>710</itunes:duration>
      <itunes:summary>In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.</itunes:summary>
      <itunes:subtitle>In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.</itunes:subtitle>
      <itunes:keywords>Hybrid Active Directory, Hybrid AD podcast, Password security, MFA, Help desk, Password self-service, ADSelfService Plus, AD360</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Getting started with file security</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Getting started with file security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">246fef5a-192a-4f40-8631-f5298b4398dd</guid>
      <link>https://share.transistor.fm/s/5e34a6c5</link>
      <description>
        <![CDATA[In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.]]>
      </content:encoded>
      <pubDate>Mon, 18 May 2020 15:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/5e34a6c5/d7f82237.mp3" length="22048051" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/_sWvvrvu6qn8ZNSNRIdACBLUiZJTjQTCuuiOsscrChY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzI1OTIwNy8x/NTg5NTU3NDAwLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>915</itunes:duration>
      <itunes:summary>In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.</itunes:summary>
      <itunes:subtitle>In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the s</itunes:subtitle>
      <itunes:keywords>file server, data leak prevention, data loss prevention, data security, folder security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips to overcome cybersecurity challenges while working from home.</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Tips to overcome cybersecurity challenges while working from home.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ee055f1-0707-4852-a2ff-56a6844e2a8f</guid>
      <link>https://share.transistor.fm/s/e8dfc643</link>
      <description>
        <![CDATA[With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.]]>
      </description>
      <content:encoded>
        <![CDATA[With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.]]>
      </content:encoded>
      <pubDate>Wed, 06 May 2020 14:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/e8dfc643/51a3f1c7.mp3" length="21561156" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>895</itunes:duration>
      <itunes:summary>With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.</itunes:summary>
      <itunes:subtitle>With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the secur</itunes:subtitle>
      <itunes:keywords>IT security, SIEM, WFH, IT security podcast, VPN monitoring</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The biggest challenges IT administrators face during a crisis</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>The biggest challenges IT administrators face during a crisis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff313621-efbd-4170-9c54-6b4c8f415d89</guid>
      <link>https://share.transistor.fm/s/cd518b59</link>
      <description>
        <![CDATA[IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.]]>
      </description>
      <content:encoded>
        <![CDATA[IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.]]>
      </content:encoded>
      <pubDate>Wed, 29 Apr 2020 16:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/cd518b59/482e978c.mp3" length="30587284" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>1271</itunes:duration>
      <itunes:summary>IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.</itunes:summary>
      <itunes:subtitle>IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administr</itunes:subtitle>
      <itunes:keywords>WFH, Remote employees, administrators, challenges faced by admins, IT security, SIEM, ManageEngine Log360</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Expert Tech Talk Podcast series feat. The Monopoly Man - Part 2</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Expert Tech Talk Podcast series feat. The Monopoly Man - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">caa31c74-e1e4-46a6-a985-2cca3ecd7438</guid>
      <link>https://share.transistor.fm/s/4384849d</link>
      <description>
        <![CDATA[In the final episode of our two-part Expert Tech-Talk podcast series, the Monopoly Man discusses the significance of the CCPA, the consequences of a data breach and why organizations must be careful while protecting user data.]]>
      </description>
      <content:encoded>
        <![CDATA[In the final episode of our two-part Expert Tech-Talk podcast series, the Monopoly Man discusses the significance of the CCPA, the consequences of a data breach and why organizations must be careful while protecting user data.]]>
      </content:encoded>
      <pubDate>Mon, 20 Apr 2020 15:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/4384849d/1144b8d0.mp3" length="17024379" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>706</itunes:duration>
      <itunes:summary>In the final episode of our two-part Expert Tech-Talk podcast series, the Monopoly Man discusses the significance of the CCPA, the consequences of a data breach and why organizations must be careful while protecting user data.</itunes:summary>
      <itunes:subtitle>In the final episode of our two-part Expert Tech-Talk podcast series, the Monopoly Man discusses the significance of the CCPA, the consequences of a data breach and why organizations must be careful while protecting user data.</itunes:subtitle>
      <itunes:keywords>The Monopoly Man, CCPA, Privacy law, Privacy mandate, ManageEngine, Log360</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Expert Tech Talk Podcast series feat. The Monopoly Man - Part 1</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Expert Tech Talk Podcast series feat. The Monopoly Man - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a555df80-dad0-4b93-8764-790858766a15</guid>
      <link>https://share.transistor.fm/s/c80157ff</link>
      <description>
        <![CDATA[Ian Madrigal, also known as the, 'Monopoly Man', joins Sid, in our Expert Tech-Talk podcast series. Listen to their take on the importance of data privacy in today's times, and why companies should be doing more to protect user data.]]>
      </description>
      <content:encoded>
        <![CDATA[Ian Madrigal, also known as the, 'Monopoly Man', joins Sid, in our Expert Tech-Talk podcast series. Listen to their take on the importance of data privacy in today's times, and why companies should be doing more to protect user data.]]>
      </content:encoded>
      <pubDate>Mon, 13 Apr 2020 20:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/c80157ff/f0052dc9.mp3" length="20491534" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>851</itunes:duration>
      <itunes:summary>Ian Madrigal, also known as the, 'Monopoly Man', joins Sid, in our Expert Tech-Talk podcast series. Listen to their take on the importance of data privacy in today's times, and why companies should be doing more to protect user data.</itunes:summary>
      <itunes:subtitle>Ian Madrigal, also known as the, 'Monopoly Man', joins Sid, in our Expert Tech-Talk podcast series. Listen to their take on the importance of data privacy in today's times, and why companies should be doing more to protect user data.</itunes:subtitle>
      <itunes:keywords>Monopoly Man, ManageEngine podcast, Monopoly Man privacy podcast, Privacy podcast, The Monopoly Man, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The role of threat intelligence in SIEM</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>The role of threat intelligence in SIEM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff9f8ca9-eb20-46eb-be0f-042fa32c2f95</guid>
      <link>https://share.transistor.fm/s/8cb0f53c</link>
      <description>
        <![CDATA[In this week's episode, Sid discusses the role of threat intelligence in enhancing the capabilities of a SIEM. Find out how threat intelligence assists in detecting, investigating, and responding to attacks using the documented knowledge of known malicious threats around the globe, and much more.]]>
      </description>
      <content:encoded>
        <![CDATA[In this week's episode, Sid discusses the role of threat intelligence in enhancing the capabilities of a SIEM. Find out how threat intelligence assists in detecting, investigating, and responding to attacks using the documented knowledge of known malicious threats around the globe, and much more.]]>
      </content:encoded>
      <pubDate>Tue, 07 Apr 2020 13:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/8cb0f53c/f79bc72b.mp3" length="16457915" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>683</itunes:duration>
      <itunes:summary>In this week's episode, Sid discusses the role of threat intelligence in enhancing the capabilities of a SIEM. Find out how threat intelligence assists in detecting, investigating, and responding to attacks using the documented knowledge of known malicious threats around the globe, and much more.</itunes:summary>
      <itunes:subtitle>In this week's episode, Sid discusses the role of threat intelligence in enhancing the capabilities of a SIEM. Find out how threat intelligence assists in detecting, investigating, and responding to attacks using the documented knowledge of known maliciou</itunes:subtitle>
      <itunes:keywords>threat intelligence, SIEM, threat intelligence in SIEM, Gartner magic quadrant</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Privileged attacks in Active Directory</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Privileged attacks in Active Directory</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fde4129c-5ea7-44df-aa9b-fb5348d9b5a2</guid>
      <link>https://share.transistor.fm/s/b6be9049</link>
      <description>
        <![CDATA[In this episode, you can learn in detail about two complex attacks - the admin count and DC shadow attack on an Active Directory environment. Tune in to discover how they happen, and why it's necessary for you to have solutions in place to detect them.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, you can learn in detail about two complex attacks - the admin count and DC shadow attack on an Active Directory environment. Tune in to discover how they happen, and why it's necessary for you to have solutions in place to detect them.]]>
      </content:encoded>
      <pubDate>Thu, 19 Mar 2020 12:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/b6be9049/c6118f56.mp3" length="20629368" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>857</itunes:duration>
      <itunes:summary>In this episode, you can learn in detail about two complex attacks - the admin count and DC shadow attack on an Active Directory environment. Tune in to discover how they happen, and why it's necessary for you to have solutions in place to detect them.</itunes:summary>
      <itunes:subtitle>In this episode, you can learn in detail about two complex attacks - the admin count and DC shadow attack on an Active Directory environment. Tune in to discover how they happen, and why it's necessary for you to have solutions in place to detect them.</itunes:subtitle>
      <itunes:keywords>AD, Priviledged attacks, Active Directory, SIEM, Logs, Hybrid Active Directory</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Introduction to Azure AD</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Introduction to Azure AD</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b3bd957-72a6-410e-8ea1-19128d18d96b</guid>
      <link>https://share.transistor.fm/s/f0a70eb1</link>
      <description>
        <![CDATA[In this episode, Vivin provides a brief overview of Azure Active Directory. Listen to his expert take on the various ways in which you can interact with Azure AD platform, assign permissions, and the importance of creating emergency access accounts.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Vivin provides a brief overview of Azure Active Directory. Listen to his expert take on the various ways in which you can interact with Azure AD platform, assign permissions, and the importance of creating emergency access accounts.]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2020 13:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/f0a70eb1/3cb56517.mp3" length="21321280" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>In this episode, Vivin provides a brief overview of Azure Active Directory. Listen to his expert take on the various ways in which you can interact with Azure AD platform, assign permissions, and the importance of creating emergency access accounts.</itunes:summary>
      <itunes:subtitle>In this episode, Vivin provides a brief overview of Azure Active Directory. Listen to his expert take on the various ways in which you can interact with Azure AD platform, assign permissions, and the importance of creating emergency access accounts.</itunes:subtitle>
      <itunes:keywords>Azure AD, Active Directory, Hybrid AD</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>6 SIEM concepts every security admin must know</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>6 SIEM concepts every security admin must know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0658478c-42d6-4f7f-9fad-5007366d273c</guid>
      <link>https://share.transistor.fm/s/c47839f5</link>
      <description>
        <![CDATA[In this episode, Sid explains 6 key SIEM concepts that every security admin must know.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Sid explains 6 key SIEM concepts that every security admin must know.]]>
      </content:encoded>
      <pubDate>Wed, 26 Feb 2020 15:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/c47839f5/28fe075a.mp3" length="24159139" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>1004</itunes:duration>
      <itunes:summary>In this episode, Sid explains 6 key SIEM concepts that every security admin must know.</itunes:summary>
      <itunes:subtitle>In this episode, Sid explains 6 key SIEM concepts that every security admin must know.</itunes:subtitle>
      <itunes:keywords>SIEM, ManageEngine, Log360, SIEM concepts</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Demystifying hybrid Active Directory</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Demystifying hybrid Active Directory</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">272cf9eb-4e91-4f88-a0e5-dd5caf2ca0d0</guid>
      <link>https://share.transistor.fm/s/ac1a5fd7</link>
      <description>
        <![CDATA[In this episode, Harish shares his take on the reasons behind the growing popularity of a hybrid Active Directory environment. He also recommends three key steps to secure your hybrid AD infrastructure from potential threats.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Harish shares his take on the reasons behind the growing popularity of a hybrid Active Directory environment. He also recommends three key steps to secure your hybrid AD infrastructure from potential threats.]]>
      </content:encoded>
      <pubDate>Wed, 19 Feb 2020 15:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/ac1a5fd7/051adafe.mp3" length="22891161" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>951</itunes:duration>
      <itunes:summary>In this episode, Harish shares his take on the reasons behind the growing popularity of a hybrid Active Directory environment. He also recommends three key steps to secure your hybrid AD infrastructure from potential threats.</itunes:summary>
      <itunes:subtitle>In this episode, Harish shares his take on the reasons behind the growing popularity of a hybrid Active Directory environment. He also recommends three key steps to secure your hybrid AD infrastructure from potential threats.</itunes:subtitle>
      <itunes:keywords>Hybrid Active Directory, Hybrid AD, Active Directory, Azure AD, Azure Active Directory</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Basics of Cloud Access Security Broker</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Basics of Cloud Access Security Broker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b753a02f-2fe7-4fce-885d-81cabcc2045a</guid>
      <link>https://share.transistor.fm/s/22994f83</link>
      <description>
        <![CDATA[In this episode, Vivin shares his take on Cloud Access Security Broker (CASB). Listen to discover the various insights that you can get into your cloud application usage, by deploying CASB in your environment.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Vivin shares his take on Cloud Access Security Broker (CASB). Listen to discover the various insights that you can get into your cloud application usage, by deploying CASB in your environment.]]>
      </content:encoded>
      <pubDate>Mon, 10 Feb 2020 14:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/22994f83/163aa931.mp3" length="12736915" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>528</itunes:duration>
      <itunes:summary>In this episode, Vivin shares his take on Cloud Access Security Broker (CASB). Listen to discover the various insights that you can get into your cloud application usage, by deploying CASB in your environment.</itunes:summary>
      <itunes:subtitle>In this episode, Vivin shares his take on Cloud Access Security Broker (CASB). Listen to discover the various insights that you can get into your cloud application usage, by deploying CASB in your environment.</itunes:subtitle>
      <itunes:keywords>CASB, Cloud Access Security Broker, Cloud security, Cloud application</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Detecting security threats at multiple layers using an SIEM solution</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Detecting security threats at multiple layers using an SIEM solution</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5afe9fc2-6334-471f-99a2-c045973b3f5c</guid>
      <link>https://share.transistor.fm/s/2bd5ceec</link>
      <description>
        <![CDATA[In our first episode of 2020, learn how you can detect and mitigate security threats at multiple layers using an SIEM (security information and event management) solution. Discover how you can monitor potential threats and take corrective action for suspicious activities taking place at the following layers: Cloud and Internet, network, data layer, and the host.]]>
      </description>
      <content:encoded>
        <![CDATA[In our first episode of 2020, learn how you can detect and mitigate security threats at multiple layers using an SIEM (security information and event management) solution. Discover how you can monitor potential threats and take corrective action for suspicious activities taking place at the following layers: Cloud and Internet, network, data layer, and the host.]]>
      </content:encoded>
      <pubDate>Tue, 07 Jan 2020 10:30:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/2bd5ceec/ab6a4b37.mp3" length="16001247" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>664</itunes:duration>
      <itunes:summary>In our first episode of 2020, learn how you can detect and mitigate security threats at multiple layers using an SIEM (security information and event management) solution. Discover how you can monitor potential threats and take corrective action for suspicious activities taking place at the following layers: Cloud and Internet, network, data layer, and the host.</itunes:summary>
      <itunes:subtitle>In our first episode of 2020, learn how you can detect and mitigate security threats at multiple layers using an SIEM (security information and event management) solution. Discover how you can monitor potential threats and take corrective action for suspi</itunes:subtitle>
      <itunes:keywords>SIEM, Security Information and Event Management solution, Log360, ManageEngine SIEM solution</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Five key principles of data security</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Five key principles of data security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d191852-1e93-4833-a2b2-34c9685eb044</guid>
      <link>https://share.transistor.fm/s/8b19c411</link>
      <description>
        <![CDATA[In our first co-hosted podcast, Vivin and Sid explain the five important steps to secure the data in your IT environment.]]>
      </description>
      <content:encoded>
        <![CDATA[In our first co-hosted podcast, Vivin and Sid explain the five important steps to secure the data in your IT environment.]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2019 13:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/8b19c411/d85c862a.mp3" length="18756905" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>778</itunes:duration>
      <itunes:summary>In our first co-hosted podcast, Vivin and Sid explain the five important steps to secure the data in your IT environment.</itunes:summary>
      <itunes:subtitle>In our first co-hosted podcast, Vivin and Sid explain the five important steps to secure the data in your IT environment.</itunes:subtitle>
      <itunes:keywords>Active Directory, Five key principles of data security, 5 key principles of data security, PII, GDPR, CCPA, Compliance, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The importance of data security.</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>The importance of data security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">75142d32-ff2d-4c8b-8a88-b57e3332b95c</guid>
      <link>https://share.transistor.fm/s/6488ce88</link>
      <description>
        <![CDATA[In this episode, Harish explains why data security is of paramount importance. Tune in as he highlights how data protection can be improved while also underlining the growing importance on data security due to compliance mandates like the GDPR. ]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Harish explains why data security is of paramount importance. Tune in as he highlights how data protection can be improved while also underlining the growing importance on data security due to compliance mandates like the GDPR. ]]>
      </content:encoded>
      <pubDate>Tue, 19 Nov 2019 10:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/6488ce88/dba2bd7f.mp3" length="28864602" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>1113</itunes:duration>
      <itunes:summary>In this episode, Harish explains why data security is of paramount importance. Tune in as he highlights how data protection can be improved while also underlining the growing importance on data security due to compliance mandates like the GDPR. </itunes:summary>
      <itunes:subtitle>In this episode, Harish explains why data security is of paramount importance. Tune in as he highlights how data protection can be improved while also underlining the growing importance on data security due to compliance mandates like the GDPR. </itunes:subtitle>
      <itunes:keywords>Data security, GDPR, Data privacy, CCPA, Phishing attacks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How does a SIEM solution help in responding to security incidents?</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>How does a SIEM solution help in responding to security incidents?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4fc9724-05e3-4197-ae9d-b2c9a8e5836c</guid>
      <link>https://share.transistor.fm/s/8bf29f95</link>
      <description>
        <![CDATA[In this podcast, Sid explains how an SIEM solution helps in responding to security incidents. Tune in as he explains the different types of alerts which can be configured based on the severity of the incident, the importance of integrating an SIEM solution to a centralized help desk tool and the benefits of automated response workflows.]]>
      </description>
      <content:encoded>
        <![CDATA[In this podcast, Sid explains how an SIEM solution helps in responding to security incidents. Tune in as he explains the different types of alerts which can be configured based on the severity of the incident, the importance of integrating an SIEM solution to a centralized help desk tool and the benefits of automated response workflows.]]>
      </content:encoded>
      <pubDate>Tue, 12 Nov 2019 10:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/8bf29f95/52db8898.mp3" length="16745216" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>726</itunes:duration>
      <itunes:summary>In this podcast, Sid explains how an SIEM solution helps in responding to security incidents. Tune in as he explains the different types of alerts which can be configured based on the severity of the incident, the importance of integrating an SIEM solution to a centralized help desk tool and the benefits of automated response workflows.</itunes:summary>
      <itunes:subtitle>In this podcast, Sid explains how an SIEM solution helps in responding to security incidents. Tune in as he explains the different types of alerts which can be configured based on the severity of the incident, the importance of integrating an SIEM solutio</itunes:subtitle>
      <itunes:keywords>SIEM, SIEM responding to security incidents, Security Information and Event Management solution podcast, SIEM podcast, Alert profiles</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The security landscape as we near 2020.</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>The security landscape as we near 2020.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9dff6cda-b1f8-4390-88a4-81cd03b2b8bd</guid>
      <link>https://share.transistor.fm/s/02403266</link>
      <description>
        <![CDATA[With 2020 fast approaching, Derek Melber, AD MVP, examines the security landscape and highlights crucial areas where you need to focus your security strategy. Tune in as he shares his expert take on monitoring privileges, constantly monitoring service accounts, password policy and much more.]]>
      </description>
      <content:encoded>
        <![CDATA[With 2020 fast approaching, Derek Melber, AD MVP, examines the security landscape and highlights crucial areas where you need to focus your security strategy. Tune in as he shares his expert take on monitoring privileges, constantly monitoring service accounts, password policy and much more.]]>
      </content:encoded>
      <pubDate>Tue, 05 Nov 2019 13:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/02403266/8fabd301.mp3" length="20449710" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>709</itunes:duration>
      <itunes:summary>With 2020 fast approaching, Derek Melber, AD MVP, examines the security landscape and highlights crucial areas where you need to focus your security strategy. Tune in as he shares his expert take on monitoring privileges, constantly monitoring service accounts, password policy and much more.</itunes:summary>
      <itunes:subtitle>With 2020 fast approaching, Derek Melber, AD MVP, examines the security landscape and highlights crucial areas where you need to focus your security strategy. Tune in as he shares his expert take on monitoring privileges, constantly monitoring service acc</itunes:subtitle>
      <itunes:keywords>IT Security in 2020, Security, Privileged access, User permissions</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why are strong passwords crucial?</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Why are strong passwords crucial?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6e6c73c-86cb-4fcd-af5b-9360412d3aa4</guid>
      <link>https://share.transistor.fm/s/11ed254f</link>
      <description>
        <![CDATA[A combination of weak authentication protocols and the use of easy-to-guess passwords have led to numerous security breaches.

Derek Melber, AD MVP, shares his take on the importance of strong passwords, best practices of password policy, and much more in this episode.]]>
      </description>
      <content:encoded>
        <![CDATA[A combination of weak authentication protocols and the use of easy-to-guess passwords have led to numerous security breaches.

Derek Melber, AD MVP, shares his take on the importance of strong passwords, best practices of password policy, and much more in this episode.]]>
      </content:encoded>
      <pubDate>Tue, 29 Oct 2019 12:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/11ed254f/1e27701b.mp3" length="18954184" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>646</itunes:duration>
      <itunes:summary>A combination of weak authentication protocols and the use of easy-to-guess passwords have led to numerous security breaches.

Derek Melber, AD MVP, shares his take on the importance of strong passwords, best practices of password policy, and much more in this episode.</itunes:summary>
      <itunes:subtitle>A combination of weak authentication protocols and the use of easy-to-guess passwords have led to numerous security breaches.

Derek Melber, AD MVP, shares his take on the importance of strong passwords, best practices of password policy, and much more </itunes:subtitle>
      <itunes:keywords>Passwords, Password security, Strong Passwords, MFA, Multifactor Authentication, IT Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Active Directory baselines - Must have security reports</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Active Directory baselines - Must have security reports</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a695855a-28a9-438f-8249-bd280a08fced</guid>
      <link>https://share.transistor.fm/s/9b1f0a7e</link>
      <description>
        <![CDATA[In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD. ]]>
      </description>
      <content:encoded>
        <![CDATA[In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD. ]]>
      </content:encoded>
      <pubDate>Tue, 22 Oct 2019 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/9b1f0a7e/20223ce6.mp3" length="30005800" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>1179</itunes:duration>
      <itunes:summary>In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD. </itunes:summary>
      <itunes:subtitle>In Episode 6 of our weekly podcast series, Harish explains how administrators find it difficult to manage and monitor their AD environment even today. Tune in to understand the must-have security reports to ensure you stay on top of your AD. </itunes:subtitle>
      <itunes:keywords>Active Directory, IT Security, AD</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Introduction to UEBA</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Introduction to UEBA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a90397a7-bee6-41ae-9653-5f3c95fed72b</guid>
      <link>https://share.transistor.fm/s/46e63b83</link>
      <description>
        <![CDATA[In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated attacks by monitoring the risk score of users and entities in your network. ]]>
      </description>
      <content:encoded>
        <![CDATA[In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated attacks by monitoring the risk score of users and entities in your network. ]]>
      </content:encoded>
      <pubDate>Tue, 15 Oct 2019 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/46e63b83/f8c74036.mp3" length="28065399" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>864</itunes:duration>
      <itunes:summary>In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated attacks by monitoring the risk score of users and entities in your network. </itunes:summary>
      <itunes:subtitle>In this podcast, Sid explains the growing importance of User and Entity Behavior Analytics (UEBA) in today's rapidly changing security landscape. Understand how UEBA powered by machine learning assists in securing your IT infrastructure from sophisticated</itunes:subtitle>
      <itunes:keywords>UEBA, Machine learning, SIEM, Artificial intelligence in SIEM</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Three important reports for Active Directory admins</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Three important reports for Active Directory admins</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4ef397c-8d73-41ff-ad11-68c5b41b105d</guid>
      <link>https://share.transistor.fm/s/52c4b1bd</link>
      <description>
        <![CDATA[In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.]]>
      </description>
      <content:encoded>
        <![CDATA[In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.]]>
      </content:encoded>
      <pubDate>Tue, 08 Oct 2019 17:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/52c4b1bd/f862ce66.mp3" length="24971215" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:duration>792</itunes:duration>
      <itunes:summary>In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.</itunes:summary>
      <itunes:subtitle>In Episode 4 of our podcast series, Vivin explains the three types of reports you must use to enhance the security of your Active Directory environment.</itunes:subtitle>
      <itunes:keywords>Active Directory, AD Security, Security groups</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why securing your Active Directory is the key component of IT Security?</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Why securing your Active Directory is the key component of IT Security?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">89ac0155-ad40-48af-ac91-14fe21973aa2</guid>
      <link>https://share.transistor.fm/s/63020c63</link>
      <description>
        <![CDATA[<p>In this episode, Hary explains why your Active Directory should be secure as it is the gateway to your organization. He also explains why setting the permissions required is the best way to ensure control.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Hary explains why your Active Directory should be secure as it is the gateway to your organization. He also explains why setting the permissions required is the best way to ensure control.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Sep 2019 02:00:00 +0530</pubDate>
      <author>ManageEngine ADSolutions</author>
      <enclosure url="https://media.transistor.fm/63020c63/a1c87f31.mp3" length="32971379" type="audio/mpeg"/>
      <itunes:author>ManageEngine ADSolutions</itunes:author>
      <itunes:image href="https://img.transistor.fm/lNGfZ8IYY9EWuE7N3IvRB_eRDMxoPlnj0VIKRwCNj30/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg4NjY5LzE1/Njc1ODgwMjYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>1029</itunes:duration>
      <itunes:summary>In this episode, Harish explains why securing your Active Directory is important in ensuring the security of IT infrastructure. Discover the importance of assigning the right permissions to users in your organization, the limitations of native AD, etc. He also explains how weak passwords are a potential pathway for malicious elements to infiltrate your IT environment and the preventive measures which will help safeguard your infrastructure.</itunes:summary>
      <itunes:subtitle>In this episode, Harish explains why securing your Active Directory is important in ensuring the security of IT infrastructure. Discover the importance of assigning the right permissions to users in your organization, the limitations of native AD, etc. He</itunes:subtitle>
      <itunes:keywords>Active Directory, AD Security, AD, Security, IT Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Latest challenges and trends in security monitoring</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Latest challenges and trends in security monitoring</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21485206-8d6c-4f05-a149-3707eb85bef3</guid>
      <link>https://share.transistor.fm/s/973ba2c2</link>
      <description>
        <![CDATA[<p>In this episode, Sid talks about the growing threats posed by malicious entities today. He also explains how a SIEM solution can assist in beefing up the security posture of an organization. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Sid talks about the growing threats posed by malicious entities today. He also explains how a SIEM solution can assist in beefing up the security posture of an organization. </p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Sep 2019 02:00:00 +0530</pubDate>
      <author>ManageEngine</author>
      <enclosure url="https://media.transistor.fm/973ba2c2/79c575de.mp3" length="27051617" type="audio/mpeg"/>
      <itunes:author>ManageEngine</itunes:author>
      <itunes:image href="https://img.transistor.fm/ZlaVlN8GuGj7R1vfHPlyA4BUaNMuaq9DjKcPfv3un_M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg4NjcwLzE1/Njc1ODgwNTYtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>845</itunes:duration>
      <itunes:summary>Sid explains the challenges faced by today's organizations due to various factors - users logging on to multiple devices, threats posed by insiders, how it is becoming increasingly easy to launch a cyberattack, and much more. He also explains how a SIEM (Security Information and Event Management) solution can go a long way in enabling you to secure your environment.</itunes:summary>
      <itunes:subtitle>Sid explains the challenges faced by today's organizations due to various factors - users logging on to multiple devices, threats posed by insiders, how it is becoming increasingly easy to launch a cyberattack, and much more. He also explains how a SIEM (</itunes:subtitle>
      <itunes:keywords>SIEM, Cybersecurity, Data Breach, Cyberattack, IT Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Active Directory Group Policy Dos and Don'ts</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Active Directory Group Policy Dos and Don'ts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">543df8d6-847c-410b-b039-0164524c140e</guid>
      <link>https://share.transistor.fm/s/6076aab3</link>
      <description>
        <![CDATA[<p>In our very first podcast, Vivin explains in detail about the best practices, dos and don'ts when it comes to dealing with Active Directory Group Policy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In our very first podcast, Vivin explains in detail about the best practices, dos and don'ts when it comes to dealing with Active Directory Group Policy.</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Sep 2019 02:00:00 +0530</pubDate>
      <author>ManageEngine ADSolutions</author>
      <enclosure url="https://media.transistor.fm/6076aab3/f19513af.mp3" length="23912378" type="audio/mpeg"/>
      <itunes:author>ManageEngine ADSolutions</itunes:author>
      <itunes:image href="https://img.transistor.fm/DiyRihmhzxYggSqVImLHKtJe7vsug-Fa1fPWfViTF08/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg4NjY3LzE1/Njc1ODgwODEtYXJ0/d29yay5qcGc.jpg"/>
      <itunes:duration>746</itunes:duration>
      <itunes:summary>In Episode 1 of our IT Security podcast series, Vivin explains the dos and don'ts with respect to Active Directory Group Policy. Tune in as he highlights the seven important points which to enhance the security of your Active Directory infrastructure.</itunes:summary>
      <itunes:subtitle>In Episode 1 of our IT Security podcast series, Vivin explains the dos and don'ts with respect to Active Directory Group Policy. Tune in as he highlights the seven important points which to enhance the security of your Active Directory infrastructure.</itunes:subtitle>
      <itunes:keywords>Active Directory, Group Policy, IT Security, GPO, AD GPO, AD</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
