IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
June 6th, 2023 | Jay Ferron | My information Resource
A new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with root access to automatically bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device. We shared these findings with Apple through  - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
Cyber-security is consistently one of the top concerns for business leaders across every industry and when you consider that the average cost of a breach is upwards of USD4.35 million[1], its no surprise why. While this focus has often led to investment and the implementation of robust security - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
A Vulnerability has been discovered in Progress Moveit Transfer, which could allow for potential unauthorized access to the environment, escalated privileges, and remote code execution. MOVEit Transfer is a managed file transfer software that allows the enterprise to securely transfer files between - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), have issued a Joint Cybersecurity Advisory - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
The goal of this project is to define and facilitate a reference architecture(s) for digital identities that protects privacy, is implemented in a secure way, enables equity, is widely adoptable, and easy to use. The concepts of cybersecurity, privacy, and adoptability are critically important to - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
The NCCoE has published for comment Draft NIST IR 8441, Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN).  The public comment period for this draft is now open until 11:59 p.m. ET on July 5, 2023. View the publication.  Visit the project page. Email questions to - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
Today at the annual NICE Conference - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
Grow your skills at Security Virtual Training Day: Defend Against Threats and Secure Cloud Environments from Microsoft Learn. At this free event, you’ll learn to perform advanced hunting, detections, and investigations, and remediate security alerts with Microsoft Defender and Microsoft Sentinel. - Read More
 
June 6th, 2023 | Jay Ferron | My information Resource
  Read the e-book     As cloud computing continues its global expansion, security teams must adapt and find new ways to keep digital estates protected. That’s why it’s essential to build an identity and access management (IAM) strategy that can govern identities, manage permissions, and mitigate - Read More
 
May 24th, 2023 | Jay Ferron | My information Resource
Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating risk, establishing a robust security posture, and maintaining transparency and trust with the public. Formalizing actions to accept, - Read More
 

Pages