Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ingram Micro Cloud Podcasts

show episodes
 
Artwork

1
Kiss My SaaS

Ingram Micro Cloud

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kiss my SaaS is a podcast for the modern MSP. Together with industry experts, peers and all-star guests, we’re here to tackle the realities of building a future-proof MSP cloud business with no filter. Each episode is packed with real-life stories, insights and advice to ensure you can do More. Music playlist: https://open.spotify.com/playlist/6qJdsbLlGKH3CV1kVJa07J?si=58854c2b3d4d445c
  continue reading
 
Artwork
 
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
  continue reading
 
Artwork
 
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
  continue reading
 
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
  continue reading
 
Artwork

1
Smart Cities Chronicles

Smart Cities Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to The Smart Cities Chronicles - the premier podcast on smart cities action and investment. The Chronicles is hosted by the Smart Cities Council, the worlds largest network of smart cities companies, policy makers and practitioners. More information is available at www.smartcitieschronicles.com
  continue reading
 
Artwork

1
Beyond Distribution with GTDC

Global Technology Distribution Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast series focuses on insightful one-to-one conversations between Frank Vitagliano, CEO of the Global Technology Distribution Council (GTDC) and respected thought leaders from the IT community. From executives of the world’s leading tech distributors and tech vendors to esteemed analysts, researchers and other astute professionals, guests share their unique perspectives on trends and activities in the channel in a non-promotional and unbiased format.
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Artwork
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Loading …
show series
 
In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture + sales workflows into Salesforce.com. Enter Nation State threat actor UNC6395, who was able to steal the tokens and gain a backdoor into Salesforce via these OAuth tokens. We then dive into the Evol…
  continue reading
 
After serving in a channel chief role for several prominent companies over the years, Ken Marks, former CRO of Cynomi, (this episode was recorded prior to his departure) validates a philosophy he’s held for many years: top-down support is critical to channel success. He shares his thoughts on his new role, C-suite buy in with an indirect GTM and cy…
  continue reading
 
Last week, we dug into the surge of SonicWall VPN compromises. At first, there was speculation about a possible new zero day — but as the dust settled, we learned it was far more familiar: unpatched systems, misconfigurations, stale service accounts. One of the biggest takeaways came from breach attorney Spencer Pollack, who cautioned MSPs: don’t s…
  continue reading
 
In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
  continue reading
 
On July 25, 2025, the city of St. Paul, Minnesota, faced a digital onslaught that brought its municipal systems to a standstill. What began as "suspicious activity" detected on the city's internal networks quickly escalated into a confirmed cyberattack, described by Mayor Melvin Carter as a "deliberate, coordinated digital attack" orchestrated by a…
  continue reading
 
In this session of The CyberCall, we’re cutting straight into one of the most relentless threats MSPs and their clients are facing right now—targeted ransomware attacks exploiting SonicWall SSLVPNs, with signs the attackers are already shifting to Fortinet VPNs. This isn’t theory. It’s happening in the wild, and the fallout is real. Huntress has be…
  continue reading
 
A new ransomware strain, dubbed Gunra, has surfaced as a significant threat to Windows systems, with attacks detected as early as July 2025. This sophisticated malware, identified by security researchers at Palo Alto Networks’ Unit 42, targets both individual and enterprise Windows environments, encrypting critical files and demanding cryptocurrenc…
  continue reading
 
Microsoft has issued an urgent security advisory addressing two critical vulnerabilities in SharePoint Server, identified as CVE-2025-53770 and CVE-2025-53771, which have been actively exploited since July 7, 2025. These zero-day flaws allow attackers to bypass authentication and execute remote code, posing a severe risk to organizations relying on…
  continue reading
 
In a bold move to counter North Korea’s illicit financial operations, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Korea Sobaeksu Trading Company and three individuals—Kim Se Un, Jo Kyong Hun, and Myong Chol Min—for orchestrating a fraudulent IT worker scheme. This operation, designed to bypass U.S. a…
  continue reading
 
In July 2025, McDonald’s faced a significant data breach involving its AI-powered hiring platform, McHire, developed by Paradox.ai. Security researchers Ian Carroll and Sam Curry discovered critical vulnerabilities that exposed the personal information of approximately 64 million job applicants. The breach stemmed from shockingly basic security fla…
  continue reading
 
From cloud procurement and enablement to managing relationships with hyperscalers, distributors have become masters of the digital realm for their vendor and solution provider partners. In episode 59 of the Beyond Distribution with GTDC podcast, TD SYNNEX executives Reyna Thompson, President of North America, and Jessica McDowell, Senior Vice Presi…
  continue reading
 
In July 2025, a sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams to deploy Matanbuchus 3.0, a potent malware loader. This evolved version of Matanbuchus, available as a Malware-as-a-Service for as little as $2,500 on crime forums, boasts advanced stealth features like improved communication protocols, in-memory execution, …
  continue reading
 
When MSPs are selling IT and security services, the real decision often comes from the person who owns the budget and measures the risk — the CFO. In this session of The CyberCall, we’re getting inside that mindset. Jason Duncan, CFO of InfoSystems, has over two decades of experience working as a Corporate Controller & CFO, making financial, IT & s…
  continue reading
 
In May 2025, AT&T disclosed a massive data breach affecting approximately 86 million customer records, making it one of the largest cybersecurity incidents of the year. The breach involved sensitive personal information, including names, dates of birth, phone numbers, email addresses, physical addresses, and Social Security numbers. The compromised…
  continue reading
 
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — …
  continue reading
 
Big news for the defense and MSP community: The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before publication in the Federal Register — and we’re expecting to see the final rule land by October with no 60-day delay. Translation? The phased rollout begins Q4 2025. If you work with defense contracto…
  continue reading
 
With the tech industry innovating faster than ever, channel organizations need as much support as possible, and that’s where GTIA — formerly the CompTIA member community — shines. In episode 59 of Beyond Distribution with GTDC, newly appointed GTIA CEO Dan Wensley discusses the organization's past and future journey with host Frank Vitagliano. Thei…
  continue reading
 
Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around how vCISOs are no longer just about frameworks and firewalls, but about protecting business outcomes, navigating executive risk, and helping clients make strategic decisions. This week, we’re taking it a step…
  continue reading
 
On July 2, 2025, Louis Vuitton, the flagship brand of the French luxury group LVMH, became the latest victim of a sophisticated cyberattack targeting its UK operations. Hackers gained unauthorized access to the retailer’s systems, stealing sensitive customer information, including names, contact details, and purchase histories. While the company ha…
  continue reading
 
On July 4, 2025, Ingram Micro, a global IT distributor with $48 billion in annual sales, was hit by a devastating SafePay ransomware attack, causing widespread system outages. The attack, reported by BleepingComputer, disrupted operations across the company’s global network, affecting customers and partners who rely on its services for cloud, comme…
  continue reading
 
On July 2, 2025, the city of Coppell, Texas, fell victim to a ransomware attack orchestrated by the RansomHub gang, compromising the personal data of approximately 17,000 residents. The attack targeted the city’s IT systems, exposing sensitive information such as names, addresses, Social Security numbers, and driver’s license details. The breach, d…
  continue reading
 
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
  continue reading
 
Digital transformation has come a long way with investment in that area projected to reach $4 trillion dollars by 2028, and that shift shows no signs of abating, says Frank Della Rosa, Research Vice President of SaaS, Business Platforms and Ecosystems at IDC. He joins host Frank Vitagliano in episode 58 of Beyond Distribution with GTDC to discuss t…
  continue reading
 
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
  continue reading
 
In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Con…
  continue reading
 
On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
  continue reading
 
British national Kai West, 25, known online as IntelBroker, was arrested in France in February 2025 and now faces extradition to the U.S. The unsealed indictment from the Southern District of New York accuses him of orchestrating a transnational cybercrime operation that inflicted over $25 million in damages from 2022 to 2025. Under his alias Intel…
  continue reading
 
On June 12, Aflac detected unauthorized activity on its U.S. network and shut it down within hours—a response detailed in its June 20 SEC filing and press release. There was no ransomware involved, and core operations continued uninterrupted. Aflac cautions that files containing Social Security numbers, health records, claims data, employee and age…
  continue reading
 
You might want to sit up for this one because a recent report just dropped a bombshell: around a million SMS two-factor authentication (2FA) codes were intercepted. Yep, those little six-digit codes that are supposed to keep your accounts super secure? They’ve been passing through some shady hands. According to a whistleblower in the tech industry,…
  continue reading
 
The U.S. State Department just put a $10 million bounty on the table for info on Iranian hackers tied to a nasty piece of malware called IOControl. This isn’t your average computer virus—it’s a cyberweapon targeting critical infrastructure like water systems, fuel pumps, and industrial controls in the U.S. and beyond. The hackers, linked to Iran’s …
  continue reading
 
Buckle up because the FBI just dropped a major warning about a cyberattack wave that’s hitting hard. The Play ransomware, linked to some seriously shady groups, has seen a skyrocketing number of victims in May 2025, targeting businesses and critical infrastructure across the Americas and Europe. This isn’t just a random hack—it’s a coordinated atta…
  continue reading
 
A large-scale account takeover (ATO) campaign, dubbed UNK_SneakyStrike, targeted over 80,000 Microsoft Entra ID accounts across approximately 100 cloud tenants, as reported by The Hacker News on June 12, 2025. The campaign, which peaked in January 2025 with 16,500 accounts targeted in a single day, exploits the open-source penetration testing tool …
  continue reading
 
A staggering 269,552 websites were infected with the JSFireTruck JavaScript malware between March 26 and April 25, 2025, according to a report by Palo Alto Networks Unit 42, published on June 13, 2025. This large-scale campaign, which peaked with over 50,000 compromised web pages on April 12, uses sophisticated obfuscation techniques like JSFuck to…
  continue reading
 
While distribution has evolved significantly over the past few years, AI and the movement towards proactive and consultative services and will bring even greater benefits to channel partners and their customers, according to Bill Brandel, EVP and President of North America for Ingram Micro. In this episode of Beyond Distribution with GTDC, he and h…
  continue reading
 
A recent report highlights cybersecurity as a pressing concern for businesses worldwide. Drawing insights from 1,200 business leaders across more than 20 countries, the report reveals that approximately 75% of respondents experienced heightened anxiety about cybersecurity and privacy over the past year. Malware, flagged by nearly half of those surv…
  continue reading
 
The Cybersecurity and Infrastructure Security Agency (CISA) has recently faced a substantial reduction in force, with approximately one-third of its workforce—about 1,000 employees—departing under the Trump administration’s 17% budget cuts and voluntary buyout offers. Despite this contraction, the private sector is stepping into the breach: cyberse…
  continue reading
 
Victoria’s Secret disclosed that a cybersecurity breach—detected on May 24, 2025—led to the precautionary shutdown of its U.S. corporate systems and e-commerce site by May 26, keeping it offline for several days. The outage disrupted online shopping and in‑store services like returns, frustrating customers during the busy Memorial Day weekend. The …
  continue reading
 
A financially motivated threat actor, known as UNC6040, has been orchestrating a sophisticated vishing (voice phishing) and extortion campaign targeting Salesforce users securityweek.com bleepingcomputer.com. The attackers impersonate IT support staff and call English-speaking employees at organizations spanning sectors like education, hospitality,…
  continue reading
 
A recent study by Dimensional Research and SailPoint highlights growing concerns over the security implications of agentic AI—autonomous bots capable of executing complex tasks without human oversight. The research reveals that 82% of organizations have already integrated these AI agents into their operations, with projections estimating over 1.3 b…
  continue reading
 
Cybercriminals are increasingly leveraging AI-generated videos on platforms like TikTok to disseminate infostealer malware. These deceptive videos often masquerade as tutorials or promotional content, featuring AI-generated personas that appear trustworthy and familiar to viewers. Once engaged, users are directed to download malicious software such…
  continue reading
 
On May 29, 2025, the U.S. House Committee on Homeland Security convened a field hearing at Stanford University's Hoover Institution to address the nation's cybersecurity vulnerabilities. Chaired by Representative Mark Green of Tennessee, the session featured testimonies from cybersecurity experts, including former National Security Advisor H.R. McM…
  continue reading
 
Why are IT Leaders Moving from Active Directory to ZTNA? IT security is evolving fast. If you're still relying on traditional Active Directory access controls to protect your Microsoft Server environment, it might be time to rethink your strategy. In this post, I talk about why IT leaders are choosing Zero Trust Network Access — or ZTNA — to stay a…
  continue reading
 
EDR is a cybersecurity tool that monitors devices like laptops and servers, detecting and responding to threats in real time. Unlike traditional antivirus, which uses known malware signatures, EDR watches for suspicious behavior, like a program rapidly encrypting files—a ransomware red flag. Think of it as a security guard for every device. In this…
  continue reading
 
Organizations are increasingly dependent on technologies that streamline and automate operations, and AI allows channel partners to deliver in both areas for their clients. That is just one of the benefits of artificial intelligence that are discussed with a panel of industry experts in this episode of Beyond Distribution, which was recorded live a…
  continue reading
 
Are Passkeys Secure? Yes, passkeys are secure—and arguably the future of login security. They offer a phishing-resistant, user-friendly alternative to passwords and are being widely adopted by tech giants like Google, Apple, Microsoft, and others. In this episode we discuss the 5 reasons why Passkeys really are the future of login security. Buzz My…
  continue reading
 
While the industry has long embraced the IT distributor model, today the term channel services aggregator provides a more accurate description of what these organizations do for vendors and solution providers, suggests Jason Beal, President of North America for Exclusive Networks. In this episode of Beyond Distribution with GTDC, Beal and his VP of…
  continue reading
 
Cybersecurity in 2025 is a battlefield. The threats are smarter, faster, and more relentless than ever before. Let’s break down the Top Cyber Threat Trends you need to know about emerging cybersecurity trends in 2025. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcare, and local governments. Give us a ca…
  continue reading
 
A concerning trend is emerging across the business landscape: cybercriminals are increasingly turning to invoice fraud as a tactic to exploit small and medium-sized businesses. Here's how to help prevent your business from falling victim to invoice fraud. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcar…
  continue reading
 
Despite global economic uncertainty, the value of ICT distribution continues to strengthen with new technologies, services and platform investments. In episode 53 of Beyond Distribution, host Frank Vitagliano moderates an insightful conversation on what the future holds for the channel as well as its rapidly changing ecosystem with a panel of Europ…
  continue reading
 
The public sector is a critical aspect of society—we’re here to ensure they have a seamless entrance into digital transformation with safer, smoother, efficient systems. Shelby Skrhak speaks with Tony Celeste, executive director and general manager, Ingram Micro Public Sector, about: - Understanding the public sector - Cisco’s role in public sector…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play