IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
January 19th, 2022 | Jay Ferron | My information Resource
 In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats. - Read More
 
January 19th, 2022 | Jay Ferron | My information Resource
I will be speaking at this event for resellers and MSP you can register here  - Read More
 
January 19th, 2022 | Jay Ferron | My information Resource
 Zoho has released a security advisory to address an authentication bypass vulnerability (CVE-2021-44757) in ManageEngine Desktop Central and Desktop Central MSP. An attacker could exploit this vulnerability to take control of an affected system. CISA encourages users and administrators to review - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
NCCoE Releases Draft Project Description for IPv6 Transition The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Secure IPv6-Only Implementation in the Enterprise. Publication of this project description begins a process to further identify project - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
 Blockchain for Access Control Systems: Draft NISTIR 8403 Available for Comment NIST has released NIST Internal Report (NISTIR) 8403, Blockchain for Access Control Systems, for public comment. Protecting system resources against unauthorized access is the primary objective of an access control - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
 Public comments will close on January 17 for Volume C of NIST SP 1800-34, Validating the Integrity of Computing Devices  The National Institute of Standards and Technology’s National Cybersecurity Center of Excellence (NCCoE) has published the preliminary draft Volume C of NIST SP 1800-34, - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
 Following our discovery of the “Shrootless” vulnerability, Microsoft uncovered a new macOS vulnerability, “powerdir,” that could allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, thereby gaining unauthorized access to a user’s protected data. - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
The operators of the SFile ransomware, also known as Escal, have ported their malware to work and encrypt files on Linux-based operating systems.Attacks with this new Linux variant were spotted late last year, Chinese security firm Rising said in a report last week, confirmed by The Record with  - Read More
 
January 12th, 2022 | Jay Ferron | My information Resource
 NISTIR 8349: Methodology for Characterizing Network Behavior of Internet of Things Devices The National Cybersecurity Center of Excellence (NCCoE) has published for comment a draft NIST Internal Report (NISTIR) 8349: Methodology for Characterizing Network Behavior of Internet of Things Devices. - Read More
 
December 3rd, 2021 | Jay Ferron | My information Resource
 Original release date: December 2, 2021 CISA and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory identifying active exploitation of a vulnerability—CVE-2021-44077—in Zoho ManageEngine ServiceDesk Plus. CVE-2021-44077 is an unauthenticated remote code - Read More
 

Pages