IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
November 30th, 2022 | Jay Ferron | My information Resource
FREE TRAINING Microsoft training for Security EngineersSecure your systems and protect your dataYou're responsible for the design and implementation of digital security controls, managing access, and protecting your data in cloud networks and hybrid environments. Get the skills and knowledge needed - Read More
 
November 30th, 2022 | Jay Ferron | My information Resource
 The Mobile Device Security Team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has published the second draft of Special Publication 1800-22 Mobile Device Security: Bring Your Own Device (BYOD) and is seeking the public’s comments on its contents. Many organizations now support - Read More
 
November 22nd, 2022 | Jay Ferron | My information Resource
 Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure networks and devices. External tools and products that are managed by vendors and developers can pose a security risk, especially to targets in - Read More
 
November 22nd, 2022 | Jay Ferron | My information Resource
  Expand your Windows Server skill set to open new opportunities for your org to innovate and operate more efficiently—while also improving security. Join us at this exciting digital event for sessions and demos on how to save more money and time using Windows Server - Read More
 
November 22nd, 2022 | Jay Ferron | My information Resource
The National Institute of Standards and Technology (NIST) has finalized a report, first published in draft form in May, that reviews the scientific foundations of forensic methods for analyzing computers, mobile phones and other electronic devices.  The finalized report, Digital - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
NIST has published NIST Internal Report (IR) 8409, Measuring the Common Vulnerability Scoring System Base Score Equation. Calculating the severity of information technology vulnerabilities is important for prioritizing vulnerability remediation and helping to understand the risk of a vulnerability - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
What: "Special Topics on Privacy and Public Auditability" (STPPA) — Event 4. New date - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access to multiple cloud services (e.g., IaaS, SaaS), the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers and multiple branch offices), and - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts of outages that compromise IT infrastructure. However, BIA analyses can be easily expanded to consider outages related to cyber risks and - Read More
 

Pages