Bringing you IT Channel industry discussions from leading experts in Cloud, Security, Datacenter and more.
…
continue reading
Ingram Micro Podcasts
The Ingram Micro Advisor podcast features real conversations about technology with in-depth, educational content for VARs and MSPs looking to expand their practices, improve ROI and stay informed.
…
continue reading
Want to be the first to know about new technology before it becomes mainstream? Whether you’re an IT professional, CIO, an investor in tech companies, or even a computer science student, this podcast will bring you the information you need to stay relevant and be successful in the tech industry from some of the top people and companies in the world. Episodes will feature topics such as IoT, cloud evolution, augmented reality, the future of artificial intelligence, improving ROI and more.
…
continue reading
Kiss my SaaS is a podcast for the modern MSP. Together with industry experts, peers and all-star guests, we’re here to tackle the realities of building a future-proof MSP cloud business with no filter. Each episode is packed with real-life stories, insights and advice to ensure you can do More. Music playlist: https://open.spotify.com/playlist/6qJdsbLlGKH3CV1kVJa07J?si=58854c2b3d4d445c
…
continue reading
Ingram Micro Cloud BeNeLux presents a monthly cybersecurity podcast. In this podcast you get the hottest and latest cybersecurity updates. Every month we take a deep dive in one specific cybersecurity subject with the best experts in the business.
…
continue reading
Hosted by Ingram Micro Cloud's AWS Cloud Experts, Tad Davis and Colby Brakefield, this podcast will shed light on opportunities in Cloud and how to maximize your AWS practice.
…
continue reading
Ingram Micro Cloud Benelux presents a bi-weekly IaaS podcast. In this podcast you’ll get the best, latest, and hottest IaaS updates. In every episode we’ll take a deep dive in one specific infrastructure-as-a-service subject with the best experts in the business.
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
This podcast series focuses on insightful one-to-one conversations between Frank Vitagliano, CEO of the Global Technology Distribution Council (GTDC) and respected thought leaders from the IT community. From executives of the world’s leading tech distributors and tech vendors to esteemed analysts, researchers and other astute professionals, guests share their unique perspectives on trends and activities in the channel in a non-promotional and unbiased format.
…
continue reading
Distributors are evolving to help you be better prepared for network-based business. We find out how they’re gearing up to support this trend — as well what they expect from the security market in 2012.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Welcome to The Smart Cities Chronicles - the premier podcast on smart cities action and investment. The Chronicles is hosted by the Smart Cities Council, the worlds largest network of smart cities companies, policy makers and practitioners. More information is available at www.smartcitieschronicles.com
…
continue reading
Office Hours: Career Pathways for PhDs is dedicated to helping people with doctorates explore careers from academia to industry! Want to share your PhD story? Email [email protected]
…
continue reading

1
Jaguar Land Rover Hack, SpamGPT, No Chrome Sale, & Mischief Marketing
28:54
28:54
Play later
Play later
Lists
Like
Liked
28:54The Lighthouse IT Podcast - October 3rd, 2025 This week, Matt and Griff cover a range of topics, including Jaguar Land Rover's recent £1.5 billion loan to recover from a cyber attack, the emergence of Spam GPT, GPT's interaction with online shopping, and upcoming features like Chat GPT Pulse. We also touch on the ongoing legal battles of tech giant…
…
continue reading

1
Creating a Bridge Between Possibility and Reality: A Conversation with the Redington Group’s V.S. Hariharan
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27Unlocking growth, access, efficiency and trust for the vendor and provider community should be part of the distribution journey, suggests V.S. Hariharan, Managing Director and Group CEO of the Redington Group. As an IT leader in APJ and META, he believes distributors must provide value beyond boxes, logistics and credit, and provide lot of other th…
…
continue reading

1
AI-Dominated Web Traffic & AI Becoming Both the Threat and a Shield
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01The Lighthouse IT Podcast - September 19th, 2025 This week, Mark and Matt examine the new reality where AI bot traffic has surpassed human web activity, while simultaneously exploring how AI is reshaping both threats and defenses. We cover emerging challenges from Gen Z workers' security blind spots, AI-powered ransomware targeting developer tools,…
…
continue reading

1
SonicWall Exploit, Cracker Barrel's Logo, & YouTube Age Guessing
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02The Lighthouse IT Podcast - September 5th, 2025 This week, Matt and Griff discuss the wild intersection of cybersecurity, branding blunders, and algorithmic overreach. From an exploit that ripped through SonicWall to a disgruntled developer’s revenge code that landed him in prison, the digital world is anything but quiet. Add in Cracker Barrel’s $1…
…
continue reading

1
From Channel Chief to CRO, Distribution Remains a Top Priority: A Discussion with Ken Marks
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27After serving in a channel chief role for several prominent companies over the years, Ken Marks, former CRO of Cynomi, (this episode was recorded prior to his departure) validates a philosophy he’s held for many years: top-down support is critical to channel success. He shares his thoughts on his new role, C-suite buy in with an indirect GTM and cy…
…
continue reading

1
The End of Dial-Up, ChatGPT-5, AI Browsers, & Pinterest Won Over Gen Z
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33The Lighthouse IT Podcast - August 22nd, 2025 Join us in this episode of the Lighthouse IT Solutions podcast as we dive into a variety of topics! From discussing weekend movie plans including 'Barbarian', 'Him', and 'Nobody 2', to talking about technological advancements and AI's impact on the economy. We cover wins in the tech industry, such as Ep…
…
continue reading

1
CISA: Ransomware Attack Disrupts Trimble Cityworks, Threatening Local Governments
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
…
continue reading

1
St. Paul Under Siege: Minnesota National Guard Mobilized in Response to Sophisticated Cyberattack
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19On July 25, 2025, the city of St. Paul, Minnesota, faced a digital onslaught that brought its municipal systems to a standstill. What began as "suspicious activity" detected on the city's internal networks quickly escalated into a confirmed cyberattack, described by Mayor Melvin Carter as a "deliberate, coordinated digital attack" orchestrated by a…
…
continue reading

1
Gunra Ransomware Emerges as a New Threat Targeting Windows Systems
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00A new ransomware strain, dubbed Gunra, has surfaced as a significant threat to Windows systems, with attacks detected as early as July 2025. This sophisticated malware, identified by security researchers at Palo Alto Networks’ Unit 42, targets both individual and enterprise Windows environments, encrypting critical files and demanding cryptocurrenc…
…
continue reading

1
Microsoft SharePoint Zero-Day Exploited: Urgent Patch Issued for Critical Flaws
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00Microsoft has issued an urgent security advisory addressing two critical vulnerabilities in SharePoint Server, identified as CVE-2025-53770 and CVE-2025-53771, which have been actively exploited since July 7, 2025. These zero-day flaws allow attackers to bypass authentication and execute remote code, posing a severe risk to organizations relying on…
…
continue reading

1
U.S. Sanctions Target North Korean IT Scheme: Unmasking a $17M Cyber Fraud
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In a bold move to counter North Korea’s illicit financial operations, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Korea Sobaeksu Trading Company and three individuals—Kim Se Un, Jo Kyong Hun, and Myong Chol Min—for orchestrating a fraudulent IT worker scheme. This operation, designed to bypass U.S. a…
…
continue reading

1
McDonald’s Data Breach Exposes 64 Million Job Applicants Personal Info
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In July 2025, McDonald’s faced a significant data breach involving its AI-powered hiring platform, McHire, developed by Paradox.ai. Security researchers Ian Carroll and Sam Curry discovered critical vulnerabilities that exposed the personal information of approximately 64 million job applicants. The breach stemmed from shockingly basic security fla…
…
continue reading

1
Empowering Channel Excellence: A Conversation with Reyna Thompson and Jessica McDowell from TD SYNNEX
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18From cloud procurement and enablement to managing relationships with hyperscalers, distributors have become masters of the digital realm for their vendor and solution provider partners. In episode 59 of the Beyond Distribution with GTDC podcast, TD SYNNEX executives Reyna Thompson, President of North America, and Jessica McDowell, Senior Vice Presi…
…
continue reading

1
How Hackers Are Exploiting Microsoft Teams to Spread Malware
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57In July 2025, a sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams to deploy Matanbuchus 3.0, a potent malware loader. This evolved version of Matanbuchus, available as a Malware-as-a-Service for as little as $2,500 on crime forums, boasts advanced stealth features like improved communication protocols, in-memory execution, …
…
continue reading

1
AT&T Data Breach Exposes 86 Million Customer Records
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In May 2025, AT&T disclosed a massive data breach affecting approximately 86 million customer records, making it one of the largest cybersecurity incidents of the year. The breach involved sensitive personal information, including names, dates of birth, phone numbers, email addresses, physical addresses, and Social Security numbers. The compromised…
…
continue reading

1
Seismic Phones, AI Browsers, DNS Malware, and Linux Desktops
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43The Lighthouse IT Podcast - August 8th, 2025 This week, Matt and Griff uncover the hidden superpowers of everyday technology: 🫨 Millions of Android phones are now part of a crowdsourced earthquake alert system. 🐧 The surprising surge of Linux on desktops as it challenges Windows and macOS. 🤵 Microsoft Edge gets an AI 'Copilot' butler. 🏫 ChatGPT get…
…
continue reading

1
AI Feature Requests, Instagram Indexed, Grok 4, Foldable iPhone, & Ingram Micro Hack
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52The Lighthouse IT Podcast - July 25th, 2025 This week, Matt and Griff dive into: 🎸 Soundslice's Accidental Feature: Music learning platform Soundslice noticed users mistakenly believed it had a feature for scanning ASCII tablature for guitar due to misinformation from ChatGPT. Instead of correcting the error, Soundslice decided to develop the featu…
…
continue reading

1
No Longer the Channel’s Best Kept Secret: a Conversation with GTIA’s New CEO, Dan Wensley
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50With the tech industry innovating faster than ever, channel organizations need as much support as possible, and that’s where GTIA — formerly the CompTIA member community — shines. In episode 59 of Beyond Distribution with GTDC, newly appointed GTIA CEO Dan Wensley discusses the organization's past and future journey with host Frank Vitagliano. Thei…
…
continue reading

1
Louis Vuitton Data Breach: A Cybersecurity Wake-Up Call for Luxury Retail
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17On July 2, 2025, Louis Vuitton, the flagship brand of the French luxury group LVMH, became the latest victim of a sophisticated cyberattack targeting its UK operations. Hackers gained unauthorized access to the retailer’s systems, stealing sensitive customer information, including names, contact details, and purchase histories. While the company ha…
…
continue reading

1
Ingram Micro Ransomware Attack Signals Threats for Global IT Distributors
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50On July 4, 2025, Ingram Micro, a global IT distributor with $48 billion in annual sales, was hit by a devastating SafePay ransomware attack, causing widespread system outages. The attack, reported by BleepingComputer, disrupted operations across the company’s global network, affecting customers and partners who rely on its services for cloud, comme…
…
continue reading

1
City of Coppell TX Faces Ransomware Nightmare
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23On July 2, 2025, the city of Coppell, Texas, fell victim to a ransomware attack orchestrated by the RansomHub gang, compromising the personal data of approximately 17,000 residents. The attack targeted the city’s IT systems, exposing sensitive information such as names, addresses, Social Security numbers, and driver’s license details. The breach, d…
…
continue reading

1
Apple's F1 play, BlackSOD, PNG 3.0, Bots Paying Up, & Agent2Agent Ads
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13The Lighthouse IT Podcast - July 11th, 2025 This week, Matt and Griff dive into: 🏎️ Apple's F1 Movie Races to the Big Screen, and Controversy 🪦 RIP Blue Screen of Death. Meet Its Dark Successor 🖼️ PNG Format Is Back, and It's Better Than Ever 🗣️ Branding 101: Should Your Company Yell or Whisper? 🤑 Cloudflare Tells Bots to Pay Up 📈 Bots Buying Ads? …
…
continue reading

1
The Cloud Movement is a Journey, Not a Destination: A Conversation with IDC’s Frank Della Rosa
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04Digital transformation has come a long way with investment in that area projected to reach $4 trillion dollars by 2028, and that shift shows no signs of abating, says Frank Della Rosa, Research Vice President of SaaS, Business Platforms and Ecosystems at IDC. He joins host Frank Vitagliano in episode 58 of Beyond Distribution with GTDC to discuss t…
…
continue reading

1
Hawaiian Airlines Cyberattack: Flights Safe, Systems Targeted
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
…
continue reading

1
25yo UK Hacker Arrested for $25M in US Cybercrime Attacks
2:23
2:23
Play later
Play later
Lists
Like
Liked
2:23British national Kai West, 25, known online as IntelBroker, was arrested in France in February 2025 and now faces extradition to the U.S. The unsealed indictment from the Southern District of New York accuses him of orchestrating a transnational cybercrime operation that inflicted over $25 million in damages from 2022 to 2025. Under his alias Intel…
…
continue reading
On June 12, Aflac detected unauthorized activity on its U.S. network and shut it down within hours—a response detailed in its June 20 SEC filing and press release. There was no ransomware involved, and core operations continued uninterrupted. Aflac cautions that files containing Social Security numbers, health records, claims data, employee and age…
…
continue reading

1
Scattered Spider, Handheld Wars, and the Future of AI Search
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19The Lighthouse IT Podcast - June 27th, 2025 This week, Matt and Griff dive into critical cyber alerts as the "Scattered Spider" group targets insurance firms and CISA issues urgent warnings for TP-Link and Zyxel devices. In the gaming world, a new handheld war begins with the Microsoft/Asus ROG Ally taking on the record-breaking Nintendo Switch 2. …
…
continue reading

1
Million-Code Heist: Why Your 2FA Texts Aren’t Safe and How to Fix It
3:54
3:54
Play later
Play later
Lists
Like
Liked
3:54You might want to sit up for this one because a recent report just dropped a bombshell: around a million SMS two-factor authentication (2FA) codes were intercepted. Yep, those little six-digit codes that are supposed to keep your accounts super secure? They’ve been passing through some shady hands. According to a whistleblower in the tech industry,…
…
continue reading

1
U.S. Drops $10M Bounty on Iranian Hackers: The IOControl Malware Threat
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11The U.S. State Department just put a $10 million bounty on the table for info on Iranian hackers tied to a nasty piece of malware called IOControl. This isn’t your average computer virus—it’s a cyberweapon targeting critical infrastructure like water systems, fuel pumps, and industrial controls in the U.S. and beyond. The hackers, linked to Iran’s …
…
continue reading

1
FBI’s Urgent Alert: Play Ransomware Explosion Threatens All—Protect Yourself Now!
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43Buckle up because the FBI just dropped a major warning about a cyberattack wave that’s hitting hard. The Play ransomware, linked to some seriously shady groups, has seen a skyrocketing number of victims in May 2025, targeting businesses and critical infrastructure across the Americas and Europe. This isn’t just a random hack—it’s a coordinated atta…
…
continue reading

1
UNK_SneakyStrike: A Massive Microsoft Entra ID Account Takeover Campaign
3:42
3:42
Play later
Play later
Lists
Like
Liked
3:42A large-scale account takeover (ATO) campaign, dubbed UNK_SneakyStrike, targeted over 80,000 Microsoft Entra ID accounts across approximately 100 cloud tenants, as reported by The Hacker News on June 12, 2025. The campaign, which peaked in January 2025 with 16,500 accounts targeted in a single day, exploits the open-source penetration testing tool …
…
continue reading

1
Massive JSFireTruck Malware Campaign Targets 269k Websites
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45A staggering 269,552 websites were infected with the JSFireTruck JavaScript malware between March 26 and April 25, 2025, according to a report by Palo Alto Networks Unit 42, published on June 13, 2025. This large-scale campaign, which peaked with over 50,000 compromised web pages on April 12, uses sophisticated obfuscation techniques like JSFuck to…
…
continue reading

1
The Transformation of Distribution is Just Getting Started: A Conversation with Ingram Micro’s Bill Brandel
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27While distribution has evolved significantly over the past few years, AI and the movement towards proactive and consultative services and will bring even greater benefits to channel partners and their customers, according to Bill Brandel, EVP and President of North America for Ingram Micro. In this episode of Beyond Distribution with GTDC, he and h…
…
continue reading

1
Rising Cyber Risks and AI Adoption: Businesses Grapple with New Challenges
3:55
3:55
Play later
Play later
Lists
Like
Liked
3:55A recent report highlights cybersecurity as a pressing concern for businesses worldwide. Drawing insights from 1,200 business leaders across more than 20 countries, the report reveals that approximately 75% of respondents experienced heightened anxiety about cybersecurity and privacy over the past year. Malware, flagged by nearly half of those surv…
…
continue reading

1
Claude 4, Forever Trials, Gen Z Data Deals, LinkedIn Algorithm & SEO 2.0
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27The Lighthouse IT Podcast - June 13th, 2025 This week, Matt and Griff discuss the future of AI, spacey software loopholes, Apples rebranding, Gen Z's surprising take on data privacy and why your LinkedIn post probably isn't going viral. https://hub.lighthousesol.com/blog/lighthouse-podcast-2/claude-4-forever-trials-gen-z-data-deals-linkedin-algorit…
…
continue reading

1
AI Threats Drive Cybersecurity Talent Surge Amid U.S. Government Cutbacks
1:30
1:30
Play later
Play later
Lists
Like
Liked
1:30The Cybersecurity and Infrastructure Security Agency (CISA) has recently faced a substantial reduction in force, with approximately one-third of its workforce—about 1,000 employees—departing under the Trump administration’s 17% budget cuts and voluntary buyout offers. Despite this contraction, the private sector is stepping into the breach: cyberse…
…
continue reading

1
Victoria’s Secret Cyberattack Forces Website Shutdown
1:52
1:52
Play later
Play later
Lists
Like
Liked
1:52Victoria’s Secret disclosed that a cybersecurity breach—detected on May 24, 2025—led to the precautionary shutdown of its U.S. corporate systems and e-commerce site by May 26, keeping it offline for several days. The outage disrupted online shopping and in‑store services like returns, frustrating customers during the busy Memorial Day weekend. The …
…
continue reading

1
Hackers Exploit Salesforce Data Loader in Sophisticated Vishing Attack
1:44
1:44
Play later
Play later
Lists
Like
Liked
1:44A financially motivated threat actor, known as UNC6040, has been orchestrating a sophisticated vishing (voice phishing) and extortion campaign targeting Salesforce users securityweek.com bleepingcomputer.com. The attackers impersonate IT support staff and call English-speaking employees at organizations spanning sectors like education, hospitality,…
…
continue reading
A recent study by Dimensional Research and SailPoint highlights growing concerns over the security implications of agentic AI—autonomous bots capable of executing complex tasks without human oversight. The research reveals that 82% of organizations have already integrated these AI agents into their operations, with projections estimating over 1.3 b…
…
continue reading

1
Cybercriminals Use TikTok Videos to Spread Malware
1:53
1:53
Play later
Play later
Lists
Like
Liked
1:53Cybercriminals are increasingly leveraging AI-generated videos on platforms like TikTok to disseminate infostealer malware. These deceptive videos often masquerade as tutorials or promotional content, featuring AI-generated personas that appear trustworthy and familiar to viewers. Once engaged, users are directed to download malicious software such…
…
continue reading

1
Congress Urges Stronger Cybersecurity and Academia Collaboration
2:01
2:01
Play later
Play later
Lists
Like
Liked
2:01On May 29, 2025, the U.S. House Committee on Homeland Security convened a field hearing at Stanford University's Hoover Institution to address the nation's cybersecurity vulnerabilities. Chaired by Representative Mark Green of Tennessee, the session featured testimonies from cybersecurity experts, including former National Security Advisor H.R. McM…
…
continue reading

1
Holy Cards, Cheating Grads, Coinbase Bribery, Buying 23andMe & IT Cuts
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29The Lighthouse IT Podcast - May 30th, 2025 This week, Matt and Griff talk about how HBO is renaming itself again, the Pope's trading card craze, Collage students using AI to "cheat", Apple and BYOD, Coinbase's breach due to bribery, Regeneron buying 23andMe, why your IT budget might be dangerously low, and much more! https://hub.lighthousesol.com/b…
…
continue reading

1
Why IT Leaders Are Moving from Active Directory to ZTNA
2:16
2:16
Play later
Play later
Lists
Like
Liked
2:16Why are IT Leaders Moving from Active Directory to ZTNA? IT security is evolving fast. If you're still relying on traditional Active Directory access controls to protect your Microsoft Server environment, it might be time to rethink your strategy. In this post, I talk about why IT leaders are choosing Zero Trust Network Access — or ZTNA — to stay a…
…
continue reading
EDR is a cybersecurity tool that monitors devices like laptops and servers, detecting and responding to threats in real time. Unlike traditional antivirus, which uses known malware signatures, EDR watches for suspicious behavior, like a program rapidly encrypting files—a ransomware red flag. Think of it as a security guard for every device. In this…
…
continue reading

1
Building a Successful AI Strategy: A Summit EMEA Expert Panel Discussion
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Organizations are increasingly dependent on technologies that streamline and automate operations, and AI allows channel partners to deliver in both areas for their clients. That is just one of the benefits of artificial intelligence that are discussed with a panel of industry experts in this episode of Beyond Distribution, which was recorded live a…
…
continue reading
Are Passkeys Secure? Yes, passkeys are secure—and arguably the future of login security. They offer a phishing-resistant, user-friendly alternative to passwords and are being widely adopted by tech giants like Google, Apple, Microsoft, and others. In this episode we discuss the 5 reasons why Passkeys really are the future of login security. Buzz My…
…
continue reading

1
How a Song Crashed HDDs, App Store Freedom, an EV Truck, & AI Shakeups
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33The Lighthouse IT Podcast - May 16th, 2025 This week, Matt and Griff discuss: 🕹️ How Gemini 2.5 Pro beat Pokémon Blue 🎵 The Janet Jackson Song Crashed Laptops for 9 Years 🔑 OpenAI's Restructuring and Microsoft Holding the Keys 📊 AI Usage Stats in 2025: Beyond Search and Code 🔍 When AI Workers are coming and the Security Risks ⚖️ The new App Store F…
…
continue reading

1
Building a Trusted Channel Services Aggregator: A Conversation with Jason Beal and Andrew Warren of Exclusive Networks
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27While the industry has long embraced the IT distributor model, today the term channel services aggregator provides a more accurate description of what these organizations do for vendors and solution providers, suggests Jason Beal, President of North America for Exclusive Networks. In this episode of Beyond Distribution with GTDC, Beal and his VP of…
…
continue reading

1
Security Scares, Politeness Costing AI, and Tech Industry Shakeups
47:37
47:37
Play later
Play later
Lists
Like
Liked
47:37The Lighthouse IT Podcast - May 2nd, 2025 This week, Matt and Griff delve into how Sam Altman stresses the unexpected computational cost of digital politeness in AI interactions, security vulnerabilities, such as a critical flaw in CentreStack and Triofox, and an unconfirmed Oracle Cloud breach. Also, Apple is looking at new Vision models to advanc…
…
continue reading
Cybersecurity in 2025 is a battlefield. The threats are smarter, faster, and more relentless than ever before. Let’s break down the Top Cyber Threat Trends you need to know about emerging cybersecurity trends in 2025. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcare, and local governments. Give us a ca…
…
continue reading