Four Things That Changed Cybersecurity Forever AI - Artificial IntelligenceBlogCybersecurity Four Things That Changed Cybersecurity ForeverBy MicroAge Cybersecurity Team I spend a lot of my time focused on the cybersecurity…Jenn BoyleAugust 29, 2023
The Real World Use Cases for Implementing a Cloud Access Security Broker (CASB) BlogCloud TransformationCybersecurity The Real World Use Cases for Implementing a Cloud Access Security Broker (CASB)By Pete Schmitt, Chief Technology Officer As the adoption of cloud-based applications continues to surge,…Jenn BoyleAugust 24, 2023
How VXLAN is Revolutionizing Networking BlogCloud TransformationData CenterNetworkingServices How VXLAN is Revolutionizing NetworkingBy Joel Stine, Network and Firewall Architect What is VXLAN? Many of us, at one…Jenn BoyleAugust 16, 2023
7 Recommendations for Choosing the Right High-Speed Data Encryption Platform BlogCybersecurity 7 Recommendations for Choosing the Right High-Speed Data Encryption PlatformBy Jared Hrabak, Consulting Cybersecurity Engineer Remember in the early days of the Internet when…Jenn BoyleAugust 10, 2023
Protecting Your Company with Email Security & Resiliency Best Practices in Mimecast BlogCybersecurityServices Protecting Your Company with Email Security & Resiliency Best Practices in MimecastBy Jared Hrabak, Consulting Cybersecurity Engineer Do you remember the days when there were mysterious…Jenn BoyleJuly 28, 2023
Celebrating Our 1 Year Anniversary of the cStor Acquisition BlogCulture Celebrating Our 1 Year Anniversary of the cStor Acquisition5 Tips for How CEOs Can Get Acquisitions Right By Rob Zack, Chief Executive Officer,…Jenn BoyleJuly 27, 2023
Security Operations Center (SOC): To Build or Outsource? BlogCybersecurityServices Security Operations Center (SOC): To Build or Outsource?By Larry Gentry, Executive Vice President The acceleration of today’s cyber-attacks and the sophistication of…Jenn BoyleJuly 17, 2023
Microsoft Security Incident by Chinese Threat Actor Storm 0558: What You Need to Know BlogCybersecurityServices Microsoft Security Incident by Chinese Threat Actor Storm 0558: What You Need to KnowBy Chris Reid, Cybersecurity Strategist Microsoft Security Incident by 'Storm-0558': What Happened? So, you may…Jenn BoyleJuly 14, 2023
MicroAge Awarded Barracuda Discover 2023 Americas Email Protection Partner of the Year News MicroAge Awarded Barracuda Discover 2023 Americas Email Protection Partner of the YearPhoenix, Ariz. – July 13, 2023 – MicroAge®, The Digital Transformation Experts®, it was named…Jenn BoyleJuly 13, 2023
7 Tips for Hardware Asset Elimination Without Compromising Data or Compliance BlogData CenterServices 7 Tips for Hardware Asset Elimination Without Compromising Data or ComplianceBy Ronald Belensky, Director of Sales When our team asked me to participate in writing…Jenn BoyleJuly 6, 2023