Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ingram Micro Podcasts

show episodes
 
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
  continue reading
 
Artwork
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
  continue reading
 
Artwork
 
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
Beyond Distribution with GTDC

Global Technology Distribution Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast series focuses on insightful one-to-one conversations between Frank Vitagliano, CEO of the Global Technology Distribution Council (GTDC) and respected thought leaders from the IT community. From executives of the world’s leading tech distributors and tech vendors to esteemed analysts, researchers and other astute professionals, guests share their unique perspectives on trends and activities in the channel in a non-promotional and unbiased format.
  continue reading
 
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Twice-weekly conversations with top executives and thought leaders at the intersection of business, technology, and innovation. Each episode of Technovation explores the technology trends that are transforming business, and the leaders driving digital change inside their organizations. Produced by Metis Strategy and hosted by firm President Peter High, Technovation is the premier podcast for IT and technology professionals with the largest collection of interviews with elite CIOs, CTOs, and ...
  continue reading
 
Artwork

1
Distributors Talk Trends

www.sdmmag.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Distributors are evolving to help you be better prepared for network-based business. We find out how they’re gearing up to support this trend — as well what they expect from the security market in 2012.
  continue reading
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
Artwork

1
Smart Cities Chronicles

Smart Cities Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to The Smart Cities Chronicles - the premier podcast on smart cities action and investment. The Chronicles is hosted by the Smart Cities Council, the worlds largest network of smart cities companies, policy makers and practitioners. More information is available at www.smartcitieschronicles.com
  continue reading
 
Loading …
show series
 
The Ingram Micro cyber incident sent shockwaves through the IT world, but it’s more than just a headline—it’s a wake-up call for MSPs and IT providers everywhere. In this episode, I’m joined by Michael Crean to discuss the real impact, the lessons we all need to learn, and why compassion and community matter most when crisis hits. Let’s turn disrup…
  continue reading
 
(0:10): Brex Overhauls AI Strategy to Stay Competitive with Rapid Tech Advances (2:10): OpenAI Tests 'Study Together' Mode in ChatGPT: Revolutionizing Collaborative Learning for Students (4:04): TSMC Denies Japan Plant Delays Due to U.S. Shift, Cites Local Traffic Issues (6:16): Ingram Micro Ransomware Attack Disrupts Global Supply Chain, Spurs Par…
  continue reading
 
Ingram Micro has suffered a significant ransomware attack attributed to the SafePay group, disrupting its systems and affecting deliveries across multiple regions. The attack, which is believed to have exploited vulnerabilities in the company's GlobalProtect virtual private network, has left its website and online ordering systems offline since Jul…
  continue reading
 
The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
🎙️ Ingram Micro HIT by SafePay Ransomware, New Russian Hacktivists Target Ukraine, Brazil Arrests $100M Banking Hacker 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 940: Today's episode will discuss the latest news as Ingram Micro HIT by SafePay Ransomware with more news below: · …
  continue reading
 
Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but …
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
  continue reading
 
While distribution has evolved significantly over the past few years, AI and the movement towards proactive and consultative services and will bring even greater benefits to channel partners and their customers, according to Bill Brandel, EVP and President of North America for Ingram Micro. In this episode of Beyond Distribution with GTDC, he and h…
  continue reading
 
How does a $48B tech distributor reinvent itself as a platform company? In this episode, Peter High speaks with Dham Pathervellai, Chief Technology Officer of Ingram Micro, a global distributor and technology platform connecting 2500+ vendors with 160,000 customers in 200+ countries. Dham unpacks the company’s evolution from a traditional distribut…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
(0:10): Apple Challenges €500 Million EU Fine Over App Store Regulations (2:10): Amazon Warns of Prime Day Scam Surge: 92,000 Phishing Sites Target Unsuspecting Shoppers (4:06): Oracle Secures Landmark GSA Deal, Offers 75% Discount on Cloud Services to Modernize U.S. Government IT (6:21): Apple Challenges ITC Ban: Blood Oxygen Sensor Dispute with M…
  continue reading
 
Call of Duty game pulled from PC store after reported exploit U.S. military gets cybersecurity boost Bank employee helped hackers steal $100M Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC progr…
  continue reading
 
In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
  continue reading
 
According to Bleeping Computer, hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn m…
  continue reading
 
Ever wish you could turn those low-fit contracts into real cash—or acquire new clients without the headaches of traditional M&A? Matt Yesbeck, co-founder of MSPX, reveals how his platform is turning managed service contracts into currency. Hear the story behind the first marketplace designed for MSPs to buy, sell, and value contracts, and learn how…
  continue reading
 
Cybercrime damages are predicted by Cybersecurity Ventures to cost the world $10.5 trillion annually by 2025. This harrowing statistic helped a blogger from GRAPIX AI narrate the future of cybersecurity powered by AI-driven solutions. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-i…
  continue reading
 
In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
  continue reading
 
In this episode of Technovation, Peter High speaks with Rajeev Dham, Partner at Sapphire Ventures, about how venture capital investment in enterprise technology is evolving in the age of AI. Rajeev discusses why he prioritizes first-principles, highly technical founders over playbook-driven approaches, and how enterprise buyers are distinguishing b…
  continue reading
 
In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
  continue reading
 
In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
  continue reading
 
(0:10): Tech Scandal: Engineer Accused of Multi-Startup Moonlighting Sparks Debate on Ethics and Second Chances (2:03): Ilya Sutskever Takes Helm at Safe Superintelligence Amid Talent War with Meta (4:08): CoreWeave Leads AI Revolution with First Deployment of Nvidia Blackwell Ultra Chips (6:43): Apple Eyes Cloud Market, Targets AI-Driven Developer…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the face of growing AI adoption. The discussion spans topics such as the rol…
  continue reading
 
Looking to network in the cybersecurity world? Fortunately, there’s no shortage of industry associations to choose from. Today, we’re putting the spotlight on the UK Cybersecurity Association. The UK Cybersecurity Association is a group dedicated to connecting people and corporations interested in expanding their cybersecurity acumen. The organizat…
  continue reading
 
A recent poll by cybersecurity industry body ISACA found that 95% of organizations still lack a quantum computing roadmap, despite the technology's potential to break existing internet encryption. The poll, which surveyed over 2,600 professionals, revealed that 62 percent are worried about quantum computing breaking encryption, but only 5 percent c…
  continue reading
 
A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
  continue reading
 
Undetectable Android spyware leaks user logins Hunters ransomware group shuts doors Medical device company Surmodics reports cyberattack Huge thanks to our sponsor, Palo Alto Networks You’re moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. …
  continue reading
 
The managed service provider (MSP) cyber insurance landscape is facing significant challenges, primarily due to the certification process rather than the coverage itself. Edouard von Herberstein, a seasoned expert in complex risk management, recognized the inefficiencies within this system and founded Spectra, the first MSP certification platform a…
  continue reading
 
A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
  continue reading
 
A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
  continue reading
 
Are your clients tired of juggling passwords and MFA codes? In this episode, I sit down with Ahmad Al-Hidiq from EverKey to discuss how their universal smart key technology is making authentication seamless—no more codes, no more friction. Find out how MSPs can deliver effortless, secure access that employees will actually love. Why Listen: Discove…
  continue reading
 
According to MSN, PC gamers face a significantly higher risk of cybercrime than others, with 225,000,000,000 attacks per day hitting. In this episode, hosts Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss the reason for this, as well as how gamers can pro…
  continue reading
 
A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
  continue reading
 
🎙️ Qantas 6M Records STOLEN, DOJ Probes Ransomware Negotiator CORRUPTION, Columbia Hacker's Political Agenda 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 939: Today's episode will discuss the latest news as Qantas Data Breach Impacts 6 Million Customers with more news below: · DO…
  continue reading
 
In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
I’m joined by the one and only Mackenzie Brown from Blackpoint Cyber. We’re live at PAX8 Beyond in Denver, people-watching and talking all things cybersecurity. Mackenzie shares her latest “aha” moments in MSP security, including the ongoing challenges with ConnectWise and ScreenConnect, and why patching is still a pain point for many providers. We…
  continue reading
 
(0:10): HPE Settles DOJ Case, Advances $14B Juniper Acquisition to Boost Networking Prowess (2:19): Xerox Acquires Lexmark for $1.5B, Aims to Boost Market Position and Innovation (4:37): U.S. Judge Denies Huawei's Dismissal Bid in Tech Theft, Iran Sanctions Case (7:05): North Korean Hackers Deploy NimDoor Malware to Target Crypto Firms via Fake Zoo…
  continue reading
 
In this episode of Technovation, we feature a panel from the Metis Strategy Summit moderated by Ozlem Ulusoy, exploring how senior technology executives are preparing their talent for an AI-driven future. Joining the conversation are Kristie Grinnell, CIO of TD SYNNEX; Madhu Ramamurthy, CIO of Zurich North America; and Sesh Tirumala, CIO of Western…
  continue reading
 
Student data lost in Columbia University hack German hunger relief charity hit by ransomware Qantas contact center breached Huge thanks to our sponsor, Palo Alto Networks You’re moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud …
  continue reading
 
I welcome back two of my favorite MSP leaders: Dawn Sizer and Brian Weiss. We start with a bang—ThreatLocker is officially sponsoring the livestream! Dawn, a long-time advocate, shares how ThreatLocker’s zero trust approach has changed the game for her clients, while Brian gives us a behind-the-scenes look at managing security policies and the bene…
  continue reading
 
A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hac…
  continue reading
 
A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play