IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
March 21st, 2020 | Jay Ferron | My information Resource
    Cyber criminals are taking full advantage of the COVID-19 pandemic and increased communications surrounding it by installing spyware via apps to end-users’ mobile devices. The spyware being utilized is a commercial version called SpyMax, which can be acquired by anyone with - Read More
 
March 21st, 2020 | Jay Ferron | My information Resource
    Threat actors are currently spreading malicious Coronavirus themed health advisories via email which, when opened, deploy a Remote Administration Tool (RAT) onto the systems of targets. This phishing campaign has been traced back to APT36, a Pakistan-based group notable for - Read More
 
March 9th, 2020 | Jay Ferron | My information Resource
NIST requests your comments on Draft Special Publication (SP) 800-133 Revision 2, Recommendation for Cryptographic Key Generation, which discusses the generation of the keys to be managed and used by the approved cryptographic algorithms. This revision provides a method for - Read More
 
March 7th, 2020 | Jay Ferron | My information Resource
The Cybersecurity and Infrastructure Security Agency (CISA) warns individuals to remain vigilant for scams related to Coronavirus Disease 2019 (COVID-19). Cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information or - Read More
 
March 7th, 2020 | Jay Ferron | My information Resource
    Cloud security is as important as ever as more and more services are moved to the cloud. Unfortunately misconfigured servers still exist, regardless of where they are located. A simple Google search (no Shodan required) is all it takes to find unsecured S3 buckets, which can be - Read More
 
March 7th, 2020 | Jay Ferron | My information Resource
    Wireless network security has come a long way since the days of easily breakable Wired Equivalent Privacy (WEP). WiFi Protected Access (WPA) 2 has been the most commonly used standard since it was released in 2004 and has had very few vulnerabilities since the original release. - Read More
 
March 7th, 2020 | Jay Ferron | My information Resource
    The popular free Certificate Authority (CA), Let’s Encrypt, will be revoking mil-lions of certificates that enable Transport Layer Security (TLS), the subsequent protection of data between machines, and the positive identification of services for their customers. Digital - Read More
 
March 7th, 2020 | Jay Ferron | My information Resource
     Apache Tomcat has been a popular Java servlet hosting application for over 20 years. It is used to host hundreds of thousands of websites and web applications. However, a high-risk vulnerability has recently been discovered that has remained unnoticed for 13 years.   - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
For you security professions this is a great site to get guidance and software. The software listed here developed within the National Security Agency and is available to the public for use. I encourage you to check it out!I would also tell you to check out  this site as well code - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    The National Security Agency released the source code of Ghidra, its reverse engineering tool.    This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to - Read More
 

Pages