IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
September 19th, 2020 | Jay Ferron | My information Resource
 Original release date: September 18, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has released Emergency Directive (ED) 20-04 addressing a critical vulnerability— CVE-2020-1472—affecting Microsoft Windows Netlogon Remote Protocol. An unauthenticated attacker - Read More
 
July 31st, 2020 | Jay Ferron | My information Resource
This eResouceKit is your guide to Working, Learning, and Living from Home, with your security and privacy defended. It will be a long and challenging road for us all, but we can and will get there, together by taking informed actions to gain control and risk prioritization during and - Read More
 
July 31st, 2020 | Jay Ferron | My information Resource
     Routers are a key piece of any computer network and handle all traffic destined from one network to another. While business networks typically utilize big single purpose routers from vendors like Cisco or Juniper, home networks typically utilize a smaller ‘router’ - Read More
 
July 31st, 2020 | Jay Ferron | My information Resource
    Fortinet is leveraging curriculum from its NSE Institute’s training and certification program to offer 24 advanced security courses for free to help IT professionals expand their cybersecurity knowledge and address new risks.    By learning about Fortinet technologies - Read More
 
July 31st, 2020 | Jay Ferron | My information Resource
NIST seeks feedback on Draft NIST Special Publication (SP) 800-53B, Control Baselines for Information Systems and Organizations.  SP 800-53B provides three security control baselines for low-impact, moderate-impact, and high-impact federal systems, as well as a privacy control baseline for - Read More
 
July 31st, 2020 | Jay Ferron | My information Resource
     No More Ransom initiative, with four founding members, No More Ransom provides free decryption tools for ransomware and has been growing.    The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands - Read More
 
July 23rd, 2020 | Jay Ferron | My information Resource
    It has been almost a year and a half since the second round of the NIST PQC Standardization Process began. After careful consideration, NIST would like to announce the candidates that will be moving on to the third round. The seven third-round Finalists are:Third Round Finalists  - Read More
 
July 21st, 2020 | Jay Ferron | My information Resource
    CISA released its Cyber Essentials Toolkit, Chapter 2: Your Staff, The Users. This toolkit is the second in a series of six toolkits set to be released each month. This chapter follows the release of Chapter 1: Yourself, The Leader– Drive Cybersecurity Strategy Investment and - Read More
 
July 21st, 2020 | Jay Ferron | My information Resource
A security firm based out of St. Louis, Mo. which specializes in collecting breach data from online sources has itself been breached, exposing some 15 billion usernames, passwords, and other personalinformation collected from over 8000 website breaches. The breach collector technology called Data - Read More
 
July 21st, 2020 | Jay Ferron | My information Resource
    Storage infrastructure—along with compute (encompassing OS and host hardware) and network infrastructures—is one of the three fundamental pillars of Information Technology (IT). However, compared to its counterparts, it has received relatively limited attention when it - Read More
 

Pages