Navigating the Path to Secure AI Technology Adoption: An Overview for Federal Agencies AI - Artificial IntelligenceBlogCybersecurity Navigating the Path to Secure AI Technology Adoption: An Overview for Federal AgenciesBy Scott Blasenak, Director of MicroAge Government Solutions Based on recent government directives, including the…Jenn BoyleApril 30, 2024
MicroAge and Armis Transform Operational Visibility for Specialty Food Manufacturer Client StoriesCybersecurityData CenterServices MicroAge and Armis Transform Operational Visibility for Specialty Food ManufacturerThe Challenge A midsized specialty food manufacturing company, boasting a workforce of 1200 individuals spread…Jenn BoyleApril 17, 2024
4 Key Tips to Secure Your DevOps Processes BlogCybersecurity 4 Key Tips to Secure Your DevOps ProcessesBy Jared Hrabak, Consulting Cybersecurity Engineer Although it was several years ago now, there’s no…Jenn BoyleMarch 6, 2024
Safeguarding Cloud Environments: A Deep Dive into Next-Generation CASBs BlogCloud TransformationCybersecurity Safeguarding Cloud Environments: A Deep Dive into Next-Generation CASBsBy MicroAge Cybersecurity Team There’s no doubt that cloud adoption is at an all-time high…Jenn BoyleJanuary 31, 2024
Evolving Client Expectations for Managed Services Providers (MSPs): The Shift to Integrated Security Services BlogCybersecurityServices Evolving Client Expectations for Managed Services Providers (MSPs): The Shift to Integrated Security ServicesBy Travis Richards, Director of Service Delivery In the ever-evolving landscape of technology, businesses are…Jenn BoyleJanuary 23, 2024
Why a “Good Enough” Approach to Email Security is Risky Business & What to Do Next BlogCybersecurity Why a “Good Enough” Approach to Email Security is Risky Business & What to Do NextBy Jared Hrabak, Consulting Cybersecurity Engineer “Yeah, so I’ve decided to go with the mediocre…Jenn BoyleJanuary 9, 2024
Two Laws of Cloud Security BlogCloudCybersecurity Two Laws of Cloud SecurityBy MicroAge Cybersecurity Team The steady pace of workload migrations to the cloud is no…Jenn BoyleDecember 13, 2023
How to Close Your Cybersecurity Gaps with Advanced Web Filtering BlogCybersecurity How to Close Your Cybersecurity Gaps with Advanced Web FilteringBy Jared Hrabak, Consulting Cybersecurity Engineer As a kid, I joined the Boy Scouts, and…Jenn BoyleDecember 5, 2023
Why You Should Consider Doing Your Penetration Testing Now BlogCybersecurityServices Why You Should Consider Doing Your Penetration Testing NowBy Chris Reid, Cybersecurity Strategist Ahhh… October. The season when the leaves change colors, the…Jon DNA LeadsOctober 24, 2023