IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
December 16th, 2020 | Jay Ferron | My information Resource
 If you trust Google, and trust Chrome, the Chrome web store is a trusted place to look for extensions. Some are extremely useful, some are capable of blocking-ads, some make the browser look like a game, and some have a little more than expected. Over 80 million Chrome users installed one of - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
Attacks on specific chips or chipsets usually have wide reaching implications. Devices tend to use off the shelf chips inside rather than develop their own for a number of reasons. For Android phones the most popular processor chip family is the Qualcomm Snapdragon family of system on a chip (SoC - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
 Title: Cyberattacks targeting health care must stopURL: https://www.microsoft.com/security/blog/2020/11/18/cyberattacks-targeting-health-care-must-stop/Overview: In recent months, we’ve detected cyberattacks from three nation-state actors targeting seven prominent companies directly - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of active exploitation of a vulnerability in SolarWinds Orion Platform software versions 2019.4 through 2020.2.1, which was released between March 2020 through June 2020.In response CISA has published an urgent Current Activity - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
 Defining IoT Cybersecurity Requirements: Draft Guidance for Federal Agencies and IoT Device Manufacturers (SP 800-213, NISTIRs 8259B/C/D)An incredible variety and volume of Internet of Things (IoT) devices are being produced. IoT devices are ever more frequently becoming integral elements of - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
Title: Microsoft Information Protection and Microsoft Azure Purview: Better TogetherURL: https://techcommunity.microsoft.com/t5/microsoft-security-and/microsoft-information-protection-and-microsoft-azure-purview/ba-p/1957481Overview: Data is growing exponentially. Organizations are under pressure - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
 Microsoft latest security blogs, including some with more information about recent attacks.Title: Announcing EDR in block mode general availabilityURL: https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-edr-in-block-mode-general-availability/ba-p/1972064Overview - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
 Microsoft recently blogged about the Recent Nation-State Cyber Attacks that has impacted high value targets both across the government and private sector. This attack is also known as Solorigate or Sunburst. This threat actor is believed to be highly sophisticated and motivated. Relevant - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
This week, the NSA released an announcement saying, “Russian state- sponsored malicious cyber actors are exploiting a vulnerability in VMware Access and VMware Identity Manager2 products, allowing the actors access to protected data and abusing federated authentication.” This - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
ESET researchers have recently released information on the discovery of a new backdoor dubbed Crutch that uses Dropbox to exfiltrate stolen files. Crutch has been seen as early as 2015 and is believed to be a second-stage backdoor that is deployed after a victim has already been compromised. - Read More
 

Pages