Why You Should Consider Doing Your Penetration Testing Now BlogCybersecurityServices Why You Should Consider Doing Your Penetration Testing NowBy Chris Reid, Cybersecurity Strategist As the season starts to change, the atmosphere seems to…Jenn BoyleSeptember 13, 2023
Navigating the Cybersecurity Maze: How Managed Security Services Are Transforming Cyber Protection BlogCybersecurityServices Navigating the Cybersecurity Maze: How Managed Security Services Are Transforming Cyber ProtectionBy Larry Gentry, Executive Vice President In today's rapidly evolving digital landscape, cybersecurity has become…Jenn BoyleSeptember 6, 2023
Four Things That Changed Cybersecurity Forever AI - Artificial IntelligenceBlogCybersecurity Four Things That Changed Cybersecurity ForeverBy MicroAge Cybersecurity Team I spend a lot of my time focused on the cybersecurity…Jenn BoyleAugust 29, 2023
The Real World Use Cases for Implementing a Cloud Access Security Broker (CASB) BlogCloud TransformationCybersecurity The Real World Use Cases for Implementing a Cloud Access Security Broker (CASB)By MicroAge Cybersecurity Team As the adoption of cloud-based applications continues to surge, organizations are…Jenn BoyleAugust 24, 2023
How VXLAN is Revolutionizing Networking BlogCloud TransformationData CenterNetworkingServices How VXLAN is Revolutionizing NetworkingBy Joel Stine, Network and Firewall Architect What is VXLAN? Many of us, at one…Jenn BoyleAugust 16, 2023
7 Recommendations for Choosing the Right High-Speed Data Encryption Platform BlogCybersecurity 7 Recommendations for Choosing the Right High-Speed Data Encryption PlatformBy Jared Hrabak, Consulting Cybersecurity Engineer Remember in the early days of the Internet when…Jenn BoyleAugust 10, 2023
Protecting Your Company with Email Security & Resiliency Best Practices in Mimecast BlogCybersecurityServices Protecting Your Company with Email Security & Resiliency Best Practices in MimecastBy Jared Hrabak, Consulting Cybersecurity Engineer Do you remember the days when there were mysterious…Jenn BoyleJuly 28, 2023
Celebrating Our 1 Year Anniversary of the cStor Acquisition BlogCulture Celebrating Our 1 Year Anniversary of the cStor Acquisition5 Tips for How CEOs Can Get Acquisitions Right By Rob Zack, Chief Executive Officer,…Jenn BoyleJuly 27, 2023
Security Operations Center (SOC): To Build or Outsource? BlogCybersecurityServices Security Operations Center (SOC): To Build or Outsource?By Larry Gentry, Executive Vice President The acceleration of today’s cyber-attacks and the sophistication of…Jenn BoyleJuly 17, 2023