Bringing you IT Channel industry discussions from leading experts in Cloud, Security, Datacenter and more.
…
continue reading
Ingram Micro Podcasts
The Ingram Micro Advisor podcast features real conversations about technology with in-depth, educational content for VARs and MSPs looking to expand their practices, improve ROI and stay informed.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Hosted by Ingram Micro Cloud's AWS Cloud Experts, Tad Davis and Colby Brakefield, this podcast will shed light on opportunities in Cloud and how to maximize your AWS practice.
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
This podcast series focuses on insightful one-to-one conversations between Frank Vitagliano, CEO of the Global Technology Distribution Council (GTDC) and respected thought leaders from the IT community. From executives of the world’s leading tech distributors and tech vendors to esteemed analysts, researchers and other astute professionals, guests share their unique perspectives on trends and activities in the channel in a non-promotional and unbiased format.
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Twice-weekly conversations with top executives and thought leaders at the intersection of business, technology, and innovation. Each episode of Technovation explores the technology trends that are transforming business, and the leaders driving digital change inside their organizations. Produced by Metis Strategy and hosted by firm President Peter High, Technovation is the premier podcast for IT and technology professionals with the largest collection of interviews with elite CIOs, CTOs, and ...
…
continue reading
Distributors are evolving to help you be better prepared for network-based business. We find out how they’re gearing up to support this trend — as well what they expect from the security market in 2012.
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
Welcome to The Smart Cities Chronicles - the premier podcast on smart cities action and investment. The Chronicles is hosted by the Smart Cities Council, the worlds largest network of smart cities companies, policy makers and practitioners. More information is available at www.smartcitieschronicles.com
…
continue reading
Office Hours: Career Pathways for PhDs is dedicated to helping people with doctorates explore careers from academia to industry! Want to share your PhD story? Email [email protected]
…
continue reading

1
Ingram Micro Ransomware: Lessons for MSPs (EP 869)
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17The Ingram Micro cyber incident sent shockwaves through the IT world, but it’s more than just a headline—it’s a wake-up call for MSPs and IT providers everywhere. In this episode, I’m joined by Michael Crean to discuss the real impact, the lessons we all need to learn, and why compassion and community matter most when crisis hits. Let’s turn disrup…
…
continue reading

1
Brex Revamps AI Strategy, OpenAI Tests Collaborative Study Mode, TSMC Denies Japan Plant Delays, Ingram Micro Faces Ransomware Attack, and more...
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51(0:10): Brex Overhauls AI Strategy to Stay Competitive with Rapid Tech Advances (2:10): OpenAI Tests 'Study Together' Mode in ChatGPT: Revolutionizing Collaborative Learning for Students (4:04): TSMC Denies Japan Plant Delays Due to U.S. Shift, Cites Local Traffic Issues (6:16): Ingram Micro Ransomware Attack Disrupts Global Supply Chain, Spurs Par…
…
continue reading

1
Ingram Micro Cyber Attack, Windows 11 Market Growth, and Cloudflare's AI Scraper Blockade
17:30
17:30
Play later
Play later
Lists
Like
Liked
17:30Ingram Micro has suffered a significant ransomware attack attributed to the SafePay group, disrupting its systems and affecting deliveries across multiple regions. The attack, which is believed to have exploited vulnerabilities in the company's GlobalProtect virtual private network, has left its website and online ordering systems offline since Jul…
…
continue reading

1
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
…
continue reading

1
Cybercrime Wire For Jul. 7, 2025. Ransomware Hits Ingram Micro, IT Distributor. WCYB Digital Radio.
1:11
1:11
Play later
Play later
Lists
Like
Liked
1:11The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17🎙️ Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 940: Today's episode will discuss the latest news as Ingram Micro HIT by SafePay Ransomware with more news below: · …
…
continue reading

1
Ingram Micro cyberattack, Telefonica possible breach, LLM URL recommendation problem
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but …
…
continue reading

1
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
…
continue reading

1
The Transformation of Distribution is Just Getting Started: A Conversation with Ingram Micro’s Bill Brandel
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27While distribution has evolved significantly over the past few years, AI and the movement towards proactive and consultative services and will bring even greater benefits to channel partners and their customers, according to Bill Brandel, EVP and President of North America for Ingram Micro. In this episode of Beyond Distribution with GTDC, he and h…
…
continue reading

1
Inside Ingram Micro’s Platform-Driven Enterprise and AI Transformation
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10How does a $48B tech distributor reinvent itself as a platform company? In this episode, Peter High speaks with Dham Pathervellai, Chief Technology Officer of Ingram Micro, a global distributor and technology platform connecting 2500+ vendors with 160,000 customers in 200+ countries. Dham unpacks the company’s evolution from a traditional distribut…
…
continue reading

1
Cybercrime Wire For Jul. 8, 2025. Cyberattack Disrupts Up To 200K Russian Drones. WCYB Digital Radio.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For Jul. 8, 2025. Bank Heist Began With a $2.7K Bribe. WCYB Digital Radio.
2:34
2:34
Play later
Play later
Lists
Like
Liked
2:34The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Apple Challenges EU Fine, Amazon Warns of Prime Day Scams, Oracle Lands GSA Deal, Apple Fights Legal Battle Over Sensor, and more...
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15(0:10): Apple Challenges €500 Million EU Fine Over App Store Regulations (2:10): Amazon Warns of Prime Day Scam Surge: 92,000 Phishing Sites Target Unsuspecting Shoppers (4:06): Oracle Secures Landmark GSA Deal, Offers 75% Discount on Cloud Services to Modernize U.S. Government IT (6:21): Apple Challenges ITC Ban: Blood Oxygen Sensor Dispute with M…
…
continue reading

1
Call of Duty game pulled, U.S. military gets cybersecurity boost, Bank employee helped hackers
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Call of Duty game pulled from PC store after reported exploit U.S. military gets cybersecurity boost Bank employee helped hackers steal $100M Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC progr…
…
continue reading

1
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
…
continue reading

1
Talking Cyber. Scattered Spider Hackers Target Aviation. Heather Engel, Strategic Cyber Partners.
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21According to Bleeping Computer, hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn m…
…
continue reading
Ever wish you could turn those low-fit contracts into real cash—or acquire new clients without the headaches of traditional M&A? Matt Yesbeck, co-founder of MSPX, reveals how his platform is turning managed service contracts into currency. Hear the story behind the first marketplace designed for MSPs to buy, sell, and value contracts, and learn how…
…
continue reading

1
Cybercrime Magazine Update: AI-Driven Network Security Solutions. The Future Of Cybersecurity.
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Cybercrime damages are predicted by Cybersecurity Ventures to cost the world $10.5 trillion annually by 2025. This harrowing statistic helped a blogger from GRAPIX AI narrate the future of cybersecurity powered by AI-driven solutions. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-i…
…
continue reading

1
The Illusion of Shutdowns: What Hunters International's Closure Really Means
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
…
continue reading

1
Cybercrime News For Jul. 7, 2025. US Investigates Ransom Kickback Scheme. WCYB Digital Radio.
2:46
2:46
Play later
Play later
Lists
Like
Liked
2:46The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
…
continue reading

1
Backing First-Principles Founders: Rajeev Dham on AI, SaaS, and Agentic Enterprise Tech
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08In this episode of Technovation, Peter High speaks with Rajeev Dham, Partner at Sapphire Ventures, about how venture capital investment in enterprise technology is evolving in the age of AI. Rajeev discusses why he prioritizes first-principles, highly technical founders over playbook-driven approaches, and how enterprise buyers are distinguishing b…
…
continue reading

1
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
…
continue reading

1
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
…
continue reading

1
Engineer Sparks Ethics Debate, Ilya Sutskever Leads Safe Superintelligence, CoreWeave Deploys Nvidia Blackwell Chips, Apple Targets Cloud Market Expansion, and more...
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52(0:10): Tech Scandal: Engineer Accused of Multi-Startup Moonlighting Sparks Debate on Ethics and Second Chances (2:03): Ilya Sutskever Takes Helm at Safe Superintelligence Amid Talent War with Meta (4:08): CoreWeave Leads AI Revolution with First Deployment of Nvidia Blackwell Ultra Chips (6:43): Apple Eyes Cloud Market, Targets AI-Driven Developer…
…
continue reading

1
AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the face of growing AI adoption. The discussion spans topics such as the rol…
…
continue reading

1
Top Cybersecurity Industry Associations. UK Cybersecurity Association.
0:48
0:48
Play later
Play later
Lists
Like
Liked
0:48Looking to network in the cybersecurity world? Fortunately, there’s no shortage of industry associations to choose from. Today, we’re putting the spotlight on the UK Cybersecurity Association. The UK Cybersecurity Association is a group dedicated to connecting people and corporations interested in expanding their cybersecurity acumen. The organizat…
…
continue reading

1
Quantum Minute. Organizations Lack Quantum Computing Roadmaps. Sponsored by Applied Quantum.
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47A recent poll by cybersecurity industry body ISACA found that 95% of organizations still lack a quantum computing roadmap, despite the technology's potential to break existing internet encryption. The poll, which surveyed over 2,600 professionals, revealed that 62 percent are worried about quantum computing breaking encryption, but only 5 percent c…
…
continue reading

1
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
…
continue reading

1
Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09Undetectable Android spyware leaks user logins Hunters ransomware group shuts doors Medical device company Surmodics reports cyberattack Huge thanks to our sponsor, Palo Alto Networks You’re moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. …
…
continue reading

1
Building Trust in MSP Cyber Insurance: Edouard von Herberstein Discusses Spectra's Impact
25:26
25:26
Play later
Play later
Lists
Like
Liked
25:26The managed service provider (MSP) cyber insurance landscape is facing significant challenges, primarily due to the certification process rather than the coverage itself. Edouard von Herberstein, a seasoned expert in complex risk management, recognized the inefficiencies within this system and founded Spectra, the first MSP certification platform a…
…
continue reading

1
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
…
continue reading

1
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
…
continue reading
Are your clients tired of juggling passwords and MFA codes? In this episode, I sit down with Ahmad Al-Hidiq from EverKey to discuss how their universal smart key technology is making authentication seamless—no more codes, no more friction. Find out how MSPs can deliver effortless, secure access that employees will actually love. Why Listen: Discove…
…
continue reading

1
CTRL, ALT, HACKED. 225,000,000,000 Attacks Daily. Why PC Gamers Face Higher Cybercrime Risk.
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43According to MSN, PC gamers face a significantly higher risk of cybercrime than others, with 225,000,000,000 attacks per day hitting. In this episode, hosts Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss the reason for this, as well as how gamers can pro…
…
continue reading

1
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
…
continue reading

1
Qantas Data Breach Impacts 6 Million Customers, DOJ Investigates Ex-Ransomware Negotiator Over Extortion Kickbacks, Columbia Hacker Steals Data for Political Agenda
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52🎙️ Qantas 6M Records STOLEN, DOJ Probes Ransomware Negotiator CORRUPTION, Columbia Hacker's Political Agenda 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 939: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below: · DO…
…
continue reading

1
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
1:08:04
1:08:04
Play later
Play later
Lists
Like
Liked
1:08:04In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
…
continue reading

1
Cybercrime News For Jul. 3, 2025. Columbia Uni. Suffers Massive Data Breach. WCYB Digital Radio.
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Return of the Mac: Mackenzie Brown Unplugged (EP 866)
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40I’m joined by the one and only Mackenzie Brown from Blackpoint Cyber. We’re live at PAX8 Beyond in Denver, people-watching and talking all things cybersecurity. Mackenzie shares her latest “aha” moments in MSP security, including the ongoing challenges with ConnectWise and ScreenConnect, and why patching is still a pain point for many providers. We…
…
continue reading

1
HPE Advances $14B Juniper Deal, Xerox Acquires Lexmark for Innovation, Huawei's Case Against Dismissal Denied, North Korean Hackers Target Crypto Firms, and more...
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58(0:10): HPE Settles DOJ Case, Advances $14B Juniper Acquisition to Boost Networking Prowess (2:19): Xerox Acquires Lexmark for $1.5B, Aims to Boost Market Position and Innovation (4:37): U.S. Judge Denies Huawei's Dismissal Bid in Tech Theft, Iran Sanctions Case (7:05): North Korean Hackers Deploy NimDoor Malware to Target Crypto Firms via Fake Zoo…
…
continue reading

1
Talent Strategies for an AI Future: CIO Insights from TD SYNNEX, Zurich, and Western Digital
32:06
32:06
Play later
Play later
Lists
Like
Liked
32:06In this episode of Technovation, we feature a panel from the Metis Strategy Summit moderated by Ozlem Ulusoy, exploring how senior technology executives are preparing their talent for an AI-driven future. Joining the conversation are Kristie Grinnell, CIO of TD SYNNEX; Madhu Ramamurthy, CIO of Zurich North America; and Sesh Tirumala, CIO of Western…
…
continue reading

1
Columbia hack, hunger relief ransomware, Qantas breach
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Student data lost in Columbia University hack German hunger relief charity hit by ransomware Qantas contact center breached Huge thanks to our sponsor, Palo Alto Networks You’re moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud …
…
continue reading

1
ThreatLocker: Zero Trust, Zero Excuses (EP 865)
1:07:16
1:07:16
Play later
Play later
Lists
Like
Liked
1:07:16I welcome back two of my favorite MSP leaders: Dawn Sizer and Brian Weiss. We start with a bang—ThreatLocker is officially sponsoring the livestream! Dawn, a long-time advocate, shares how ThreatLocker’s zero trust approach has changed the game for her clients, while Brian gives us a behind-the-scenes look at managing security policies and the bene…
…
continue reading

1
Life Of A Cybersecurity Czar. Understanding Cyber Warfare. Dr. Eric Cole, Secure Anchor.
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hac…
…
continue reading

1
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
…
continue reading