IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
June 23rd, 2020 | Jay Ferron | My information Resource
    Sometimes malware can be a one-hit wonder: show up on the scene, cause chaos, and then never be troublesome again after exploits are patched and antivirus scanners are updated to help protect against it. Sometimes, however, a piece of malware just keeps reappearing with - Read More
 
June 19th, 2020 | Jay Ferron | My information Resource
Treck TCP/IP Stack (Update A)Legal NoticeAll information products included in https://us-cert.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
Using a new tool specifically designed for security testing on USB drivers, a group of cybersecurity specialists discovered 26 new security flaws present in various operating systems.Read the white paper https://nebelwelt.net/files/20SEC3.pdf - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    The critical flaws are part of Cisco's June 3 semi-annual advisory bundle for IOS XE and IOS networking software, which includes 23 advisories describing 25 vulnerabilities.      The 9.8 out of 10 severity bug, CVE-2020-3227, concerns the - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique that helps stay hidden on compromised - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    NIST is issuing a Call for Commentson the four-volume set of Digital Identity Guideline documents, including: Special Publication (SP) 800-63-3 Digital Identity Guidelines, SP 800-63A Enrollment and Identity Proofing, SP 800-63B Authentication and Lifecycle - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
Some cybersecurity best practices and guidance for Internet of Things (IoT) device manufacturers are now available from NIST’s Cybersecurity for IoT Program:NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline, identifies a core baseline of IoT device cybersecurity - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
   Researchers at Proofpoint have discovered a phishing campaign targeting companies within the United States’ utility sector. This campaign makes use of malicious documents to upload a remote access trojan (RAT) to the target’s system.    In July 2019, - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    The modern workplace involves a great amount of collaboration between team members and the generation of electronic documents for various purposes.  However, sharing these documents in a secure manner, especially with remote employees, has always been a troublesome issue. - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    The dark web is not the only place to find dark things. As we've shown in the past, there are plenty of criminals operating on the clear web, often in places more open than you'd expect. This week,  researchers from threat intelligence firm KELA released a report on a - Read More
 

Pages