Hosted by Ingram Micro Cloud's AWS Cloud Experts, Tad Davis and Colby Brakefield, this podcast will shed light on opportunities in Cloud and how to maximize your AWS practice.
…
continue reading
Ingram Micro Cloud Podcasts
Kiss my SaaS is a podcast for the modern MSP. Together with industry experts, peers and all-star guests, we’re here to tackle the realities of building a future-proof MSP cloud business with no filter. Each episode is packed with real-life stories, insights and advice to ensure you can do More. Music playlist: https://open.spotify.com/playlist/6qJdsbLlGKH3CV1kVJa07J?si=58854c2b3d4d445c
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
…
continue reading
Bringing you IT Channel industry discussions from leading experts in Cloud, Security, Datacenter and more.
…
continue reading
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
…
continue reading
Welcome to The Smart Cities Chronicles - the premier podcast on smart cities action and investment. The Chronicles is hosted by the Smart Cities Council, the worlds largest network of smart cities companies, policy makers and practitioners. More information is available at www.smartcitieschronicles.com
…
continue reading
This podcast series focuses on insightful one-to-one conversations between Frank Vitagliano, CEO of the Global Technology Distribution Council (GTDC) and respected thought leaders from the IT community. From executives of the world’s leading tech distributors and tech vendors to esteemed analysts, researchers and other astute professionals, guests share their unique perspectives on trends and activities in the channel in a non-promotional and unbiased format.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading

1
Encryption to Extortion, the Evolution of Cloud Based Attacks
1:02:02
1:02:02
Play later
Play later
Lists
Like
Liked
1:02:02In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture + sales workflows into Salesforce.com. Enter Nation State threat actor UNC6395, who was able to steal the tokens and gain a backdoor into Salesforce via these OAuth tokens. We then dive into the Evol…
…
continue reading

1
From Channel Chief to CRO, Distribution Remains a Top Priority: A Discussion with Ken Marks
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27After serving in a channel chief role for several prominent companies over the years, Ken Marks, former CRO of Cynomi, (this episode was recorded prior to his departure) validates a philosophy he’s held for many years: top-down support is critical to channel success. He shares his thoughts on his new role, C-suite buy in with an indirect GTM and cy…
…
continue reading

1
When Cyber Hits the Fan: How Your Contracts Protect or Expose You
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Last week, we dug into the surge of SonicWall VPN compromises. At first, there was speculation about a possible new zero day — but as the dust settled, we learned it was far more familiar: unpatched systems, misconfigurations, stale service accounts. One of the biggest takeaways came from breach attorney Spencer Pollack, who cautioned MSPs: don’t s…
…
continue reading

1
CISA: Ransomware Attack Disrupts Trimble Cityworks, Threatening Local Governments
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
…
continue reading

1
St. Paul Under Siege: Minnesota National Guard Mobilized in Response to Sophisticated Cyberattack
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19On July 25, 2025, the city of St. Paul, Minnesota, faced a digital onslaught that brought its municipal systems to a standstill. What began as "suspicious activity" detected on the city's internal networks quickly escalated into a confirmed cyberattack, described by Mayor Melvin Carter as a "deliberate, coordinated digital attack" orchestrated by a…
…
continue reading

1
Akira Ransomware’s Relentless Attack on SonicWall SSLVPNs
1:02:45
1:02:45
Play later
Play later
Lists
Like
Liked
1:02:45In this session of The CyberCall, we’re cutting straight into one of the most relentless threats MSPs and their clients are facing right now—targeted ransomware attacks exploiting SonicWall SSLVPNs, with signs the attackers are already shifting to Fortinet VPNs. This isn’t theory. It’s happening in the wild, and the fallout is real. Huntress has be…
…
continue reading

1
Gunra Ransomware Emerges as a New Threat Targeting Windows Systems
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00A new ransomware strain, dubbed Gunra, has surfaced as a significant threat to Windows systems, with attacks detected as early as July 2025. This sophisticated malware, identified by security researchers at Palo Alto Networks’ Unit 42, targets both individual and enterprise Windows environments, encrypting critical files and demanding cryptocurrenc…
…
continue reading

1
Microsoft SharePoint Zero-Day Exploited: Urgent Patch Issued for Critical Flaws
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00Microsoft has issued an urgent security advisory addressing two critical vulnerabilities in SharePoint Server, identified as CVE-2025-53770 and CVE-2025-53771, which have been actively exploited since July 7, 2025. These zero-day flaws allow attackers to bypass authentication and execute remote code, posing a severe risk to organizations relying on…
…
continue reading

1
U.S. Sanctions Target North Korean IT Scheme: Unmasking a $17M Cyber Fraud
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In a bold move to counter North Korea’s illicit financial operations, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Korea Sobaeksu Trading Company and three individuals—Kim Se Un, Jo Kyong Hun, and Myong Chol Min—for orchestrating a fraudulent IT worker scheme. This operation, designed to bypass U.S. a…
…
continue reading

1
McDonald’s Data Breach Exposes 64 Million Job Applicants Personal Info
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In July 2025, McDonald’s faced a significant data breach involving its AI-powered hiring platform, McHire, developed by Paradox.ai. Security researchers Ian Carroll and Sam Curry discovered critical vulnerabilities that exposed the personal information of approximately 64 million job applicants. The breach stemmed from shockingly basic security fla…
…
continue reading

1
Empowering Channel Excellence: A Conversation with Reyna Thompson and Jessica McDowell from TD SYNNEX
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18From cloud procurement and enablement to managing relationships with hyperscalers, distributors have become masters of the digital realm for their vendor and solution provider partners. In episode 59 of the Beyond Distribution with GTDC podcast, TD SYNNEX executives Reyna Thompson, President of North America, and Jessica McDowell, Senior Vice Presi…
…
continue reading

1
How Hackers Are Exploiting Microsoft Teams to Spread Malware
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57In July 2025, a sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams to deploy Matanbuchus 3.0, a potent malware loader. This evolved version of Matanbuchus, available as a Malware-as-a-Service for as little as $2,500 on crime forums, boasts advanced stealth features like improved communication protocols, in-memory execution, …
…
continue reading

1
Selling IT & Cybersecurity Services to the CFO (the one who writes the checks)
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43When MSPs are selling IT and security services, the real decision often comes from the person who owns the budget and measures the risk — the CFO. In this session of The CyberCall, we’re getting inside that mindset. Jason Duncan, CFO of InfoSystems, has over two decades of experience working as a Corporate Controller & CFO, making financial, IT & s…
…
continue reading

1
AT&T Data Breach Exposes 86 Million Customer Records
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In May 2025, AT&T disclosed a massive data breach affecting approximately 86 million customer records, making it one of the largest cybersecurity incidents of the year. The breach involved sensitive personal information, including names, dates of birth, phone numbers, email addresses, physical addresses, and Social Security numbers. The compromised…
…
continue reading

1
From Tokens to Trust: Microsoft’s Biggest Security Shift Yet
1:01:52
1:01:52
Play later
Play later
Lists
Like
Liked
1:01:52This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — …
…
continue reading

1
From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients
1:00:28
1:00:28
Play later
Play later
Lists
Like
Liked
1:00:28Big news for the defense and MSP community: The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before publication in the Federal Register — and we’re expecting to see the final rule land by October with no 60-day delay. Translation? The phased rollout begins Q4 2025. If you work with defense contracto…
…
continue reading

1
No Longer the Channel’s Best Kept Secret: a Conversation with GTIA’s New CEO, Dan Wensley
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50With the tech industry innovating faster than ever, channel organizations need as much support as possible, and that’s where GTIA — formerly the CompTIA member community — shines. In episode 59 of Beyond Distribution with GTDC, newly appointed GTIA CEO Dan Wensley discusses the organization's past and future journey with host Frank Vitagliano. Thei…
…
continue reading

1
What Makes a Good vCISO & Delivering at Scale
1:01:17
1:01:17
Play later
Play later
Lists
Like
Liked
1:01:17Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around how vCISOs are no longer just about frameworks and firewalls, but about protecting business outcomes, navigating executive risk, and helping clients make strategic decisions. This week, we’re taking it a step…
…
continue reading

1
Louis Vuitton Data Breach: A Cybersecurity Wake-Up Call for Luxury Retail
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17On July 2, 2025, Louis Vuitton, the flagship brand of the French luxury group LVMH, became the latest victim of a sophisticated cyberattack targeting its UK operations. Hackers gained unauthorized access to the retailer’s systems, stealing sensitive customer information, including names, contact details, and purchase histories. While the company ha…
…
continue reading

1
Ingram Micro Ransomware Attack Signals Threats for Global IT Distributors
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50On July 4, 2025, Ingram Micro, a global IT distributor with $48 billion in annual sales, was hit by a devastating SafePay ransomware attack, causing widespread system outages. The attack, reported by BleepingComputer, disrupted operations across the company’s global network, affecting customers and partners who rely on its services for cloud, comme…
…
continue reading

1
City of Coppell TX Faces Ransomware Nightmare
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23On July 2, 2025, the city of Coppell, Texas, fell victim to a ransomware attack orchestrated by the RansomHub gang, compromising the personal data of approximately 17,000 residents. The attack targeted the city’s IT systems, exposing sensitive information such as names, addresses, Social Security numbers, and driver’s license details. The breach, d…
…
continue reading

1
Risk, Revenue, and Responsibility: The vCISO’s Real Job
1:01:30
1:01:30
Play later
Play later
Lists
Like
Liked
1:01:30In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
…
continue reading

1
The Cloud Movement is a Journey, Not a Destination: A Conversation with IDC’s Frank Della Rosa
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04Digital transformation has come a long way with investment in that area projected to reach $4 trillion dollars by 2028, and that shift shows no signs of abating, says Frank Della Rosa, Research Vice President of SaaS, Business Platforms and Ecosystems at IDC. He joins host Frank Vitagliano in episode 58 of Beyond Distribution with GTDC to discuss t…
…
continue reading

1
The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
…
continue reading

1
The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Con…
…
continue reading

1
Hawaiian Airlines Cyberattack: Flights Safe, Systems Targeted
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
…
continue reading

1
25yo UK Hacker Arrested for $25M in US Cybercrime Attacks
2:23
2:23
Play later
Play later
Lists
Like
Liked
2:23British national Kai West, 25, known online as IntelBroker, was arrested in France in February 2025 and now faces extradition to the U.S. The unsealed indictment from the Southern District of New York accuses him of orchestrating a transnational cybercrime operation that inflicted over $25 million in damages from 2022 to 2025. Under his alias Intel…
…
continue reading
On June 12, Aflac detected unauthorized activity on its U.S. network and shut it down within hours—a response detailed in its June 20 SEC filing and press release. There was no ransomware involved, and core operations continued uninterrupted. Aflac cautions that files containing Social Security numbers, health records, claims data, employee and age…
…
continue reading

1
Million-Code Heist: Why Your 2FA Texts Aren’t Safe and How to Fix It
3:54
3:54
Play later
Play later
Lists
Like
Liked
3:54You might want to sit up for this one because a recent report just dropped a bombshell: around a million SMS two-factor authentication (2FA) codes were intercepted. Yep, those little six-digit codes that are supposed to keep your accounts super secure? They’ve been passing through some shady hands. According to a whistleblower in the tech industry,…
…
continue reading

1
U.S. Drops $10M Bounty on Iranian Hackers: The IOControl Malware Threat
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11The U.S. State Department just put a $10 million bounty on the table for info on Iranian hackers tied to a nasty piece of malware called IOControl. This isn’t your average computer virus—it’s a cyberweapon targeting critical infrastructure like water systems, fuel pumps, and industrial controls in the U.S. and beyond. The hackers, linked to Iran’s …
…
continue reading

1
FBI’s Urgent Alert: Play Ransomware Explosion Threatens All—Protect Yourself Now!
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43Buckle up because the FBI just dropped a major warning about a cyberattack wave that’s hitting hard. The Play ransomware, linked to some seriously shady groups, has seen a skyrocketing number of victims in May 2025, targeting businesses and critical infrastructure across the Americas and Europe. This isn’t just a random hack—it’s a coordinated atta…
…
continue reading

1
UNK_SneakyStrike: A Massive Microsoft Entra ID Account Takeover Campaign
3:42
3:42
Play later
Play later
Lists
Like
Liked
3:42A large-scale account takeover (ATO) campaign, dubbed UNK_SneakyStrike, targeted over 80,000 Microsoft Entra ID accounts across approximately 100 cloud tenants, as reported by The Hacker News on June 12, 2025. The campaign, which peaked in January 2025 with 16,500 accounts targeted in a single day, exploits the open-source penetration testing tool …
…
continue reading

1
Massive JSFireTruck Malware Campaign Targets 269k Websites
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45A staggering 269,552 websites were infected with the JSFireTruck JavaScript malware between March 26 and April 25, 2025, according to a report by Palo Alto Networks Unit 42, published on June 13, 2025. This large-scale campaign, which peaked with over 50,000 compromised web pages on April 12, uses sophisticated obfuscation techniques like JSFuck to…
…
continue reading

1
The Transformation of Distribution is Just Getting Started: A Conversation with Ingram Micro’s Bill Brandel
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27While distribution has evolved significantly over the past few years, AI and the movement towards proactive and consultative services and will bring even greater benefits to channel partners and their customers, according to Bill Brandel, EVP and President of North America for Ingram Micro. In this episode of Beyond Distribution with GTDC, he and h…
…
continue reading

1
Rising Cyber Risks and AI Adoption: Businesses Grapple with New Challenges
3:55
3:55
Play later
Play later
Lists
Like
Liked
3:55A recent report highlights cybersecurity as a pressing concern for businesses worldwide. Drawing insights from 1,200 business leaders across more than 20 countries, the report reveals that approximately 75% of respondents experienced heightened anxiety about cybersecurity and privacy over the past year. Malware, flagged by nearly half of those surv…
…
continue reading

1
AI Threats Drive Cybersecurity Talent Surge Amid U.S. Government Cutbacks
1:30
1:30
Play later
Play later
Lists
Like
Liked
1:30The Cybersecurity and Infrastructure Security Agency (CISA) has recently faced a substantial reduction in force, with approximately one-third of its workforce—about 1,000 employees—departing under the Trump administration’s 17% budget cuts and voluntary buyout offers. Despite this contraction, the private sector is stepping into the breach: cyberse…
…
continue reading

1
Victoria’s Secret Cyberattack Forces Website Shutdown
1:52
1:52
Play later
Play later
Lists
Like
Liked
1:52Victoria’s Secret disclosed that a cybersecurity breach—detected on May 24, 2025—led to the precautionary shutdown of its U.S. corporate systems and e-commerce site by May 26, keeping it offline for several days. The outage disrupted online shopping and in‑store services like returns, frustrating customers during the busy Memorial Day weekend. The …
…
continue reading

1
Hackers Exploit Salesforce Data Loader in Sophisticated Vishing Attack
1:44
1:44
Play later
Play later
Lists
Like
Liked
1:44A financially motivated threat actor, known as UNC6040, has been orchestrating a sophisticated vishing (voice phishing) and extortion campaign targeting Salesforce users securityweek.com bleepingcomputer.com. The attackers impersonate IT support staff and call English-speaking employees at organizations spanning sectors like education, hospitality,…
…
continue reading
A recent study by Dimensional Research and SailPoint highlights growing concerns over the security implications of agentic AI—autonomous bots capable of executing complex tasks without human oversight. The research reveals that 82% of organizations have already integrated these AI agents into their operations, with projections estimating over 1.3 b…
…
continue reading

1
Cybercriminals Use TikTok Videos to Spread Malware
1:53
1:53
Play later
Play later
Lists
Like
Liked
1:53Cybercriminals are increasingly leveraging AI-generated videos on platforms like TikTok to disseminate infostealer malware. These deceptive videos often masquerade as tutorials or promotional content, featuring AI-generated personas that appear trustworthy and familiar to viewers. Once engaged, users are directed to download malicious software such…
…
continue reading

1
Congress Urges Stronger Cybersecurity and Academia Collaboration
2:01
2:01
Play later
Play later
Lists
Like
Liked
2:01On May 29, 2025, the U.S. House Committee on Homeland Security convened a field hearing at Stanford University's Hoover Institution to address the nation's cybersecurity vulnerabilities. Chaired by Representative Mark Green of Tennessee, the session featured testimonies from cybersecurity experts, including former National Security Advisor H.R. McM…
…
continue reading

1
Why IT Leaders Are Moving from Active Directory to ZTNA
2:16
2:16
Play later
Play later
Lists
Like
Liked
2:16Why are IT Leaders Moving from Active Directory to ZTNA? IT security is evolving fast. If you're still relying on traditional Active Directory access controls to protect your Microsoft Server environment, it might be time to rethink your strategy. In this post, I talk about why IT leaders are choosing Zero Trust Network Access — or ZTNA — to stay a…
…
continue reading
EDR is a cybersecurity tool that monitors devices like laptops and servers, detecting and responding to threats in real time. Unlike traditional antivirus, which uses known malware signatures, EDR watches for suspicious behavior, like a program rapidly encrypting files—a ransomware red flag. Think of it as a security guard for every device. In this…
…
continue reading

1
Building a Successful AI Strategy: A Summit EMEA Expert Panel Discussion
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Organizations are increasingly dependent on technologies that streamline and automate operations, and AI allows channel partners to deliver in both areas for their clients. That is just one of the benefits of artificial intelligence that are discussed with a panel of industry experts in this episode of Beyond Distribution, which was recorded live a…
…
continue reading
Are Passkeys Secure? Yes, passkeys are secure—and arguably the future of login security. They offer a phishing-resistant, user-friendly alternative to passwords and are being widely adopted by tech giants like Google, Apple, Microsoft, and others. In this episode we discuss the 5 reasons why Passkeys really are the future of login security. Buzz My…
…
continue reading

1
Building a Trusted Channel Services Aggregator: A Conversation with Jason Beal and Andrew Warren of Exclusive Networks
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27While the industry has long embraced the IT distributor model, today the term channel services aggregator provides a more accurate description of what these organizations do for vendors and solution providers, suggests Jason Beal, President of North America for Exclusive Networks. In this episode of Beyond Distribution with GTDC, Beal and his VP of…
…
continue reading
Cybersecurity in 2025 is a battlefield. The threats are smarter, faster, and more relentless than ever before. Let’s break down the Top Cyber Threat Trends you need to know about emerging cybersecurity trends in 2025. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcare, and local governments. Give us a ca…
…
continue reading

1
Invoice Fraud: Cybercriminals use fraudulent invoices to attacks SMBs
2:38
2:38
Play later
Play later
Lists
Like
Liked
2:38A concerning trend is emerging across the business landscape: cybercriminals are increasingly turning to invoice fraud as a tactic to exploit small and medium-sized businesses. Here's how to help prevent your business from falling victim to invoice fraud. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcar…
…
continue reading

1
European Distribution Leaders Look to the Future at GTDC Summit EMEA
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27Despite global economic uncertainty, the value of ICT distribution continues to strengthen with new technologies, services and platform investments. In episode 53 of Beyond Distribution, host Frank Vitagliano moderates an insightful conversation on what the future holds for the channel as well as its rapidly changing ecosystem with a panel of Europ…
…
continue reading

1
How Cisco supports digitization in the public sector
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23The public sector is a critical aspect of society—we’re here to ensure they have a seamless entrance into digital transformation with safer, smoother, efficient systems. Shelby Skrhak speaks with Tony Celeste, executive director and general manager, Ingram Micro Public Sector, about: - Understanding the public sector - Cisco’s role in public sector…
…
continue reading