IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
October 17th, 2022 | Jay Ferron | My information Resource
 The second public draft of NIST Special Publication (SP) 800-140Br1 (Revision 1), CMVP Security Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and ISO/IEC 19790 Annex B, is now available for public comment. The initial public draft introduced four significant changes to - Read More
 
October 1st, 2022 | Jay Ferron | My information Resource
 The public comment period has been extended for the initial public draft of NIST Special Publication (SP) 800-66r2 (Revision 2), Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide. The new comment deadline is October 5, 2022. - Read More
 
October 1st, 2022 | Jay Ferron | My information Resource
 Created in 2014, this collaborative event is cooperatively developed, organized and sponsored by the leading information security industry organizations and chapters, including NY Metro ISSA. The strength of organizational membership, the provision of desirable CPE credits and the concurrence of - Read More
 
October 1st, 2022 | Jay Ferron | My information Resource
CISA warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane. Fraudulent emails—often containing malicious links or attachments—are common after major natural disasters. Exercise caution in handling emails with - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 The National Institute of Standards and Technology (NIST) has released the third public draft of NIST Special Publication (SP) 800-90C, Recommendation for Random Bit Generator (RBG) Constructions. The NIST SP 800-90 series of documents supports the generation of high-quality random bits for - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 NIST has released NIST Internal Report (IR) 8286C, Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. This report completes the cybersecurity risk management (CSRM) and enterprise risk management (ERM) integration cycle described throughout the NIST IR 8286 series - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 Our analysis of a recent version of a previously reported info-stealing Android malware, delivered through an ongoing SMS campaign, demonstrates the continuous evolution of mobile threats. Masquerading as a banking rewards app, this new version has additional remote access trojan (RAT) - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 Microsoft researchers recently investigated an attack where malicious OAuth applications were deployed on compromised cloud tenants and then used to control Exchange Online settings and spread spam. The investigation revealed that the threat actor launched credential stuffing attacks against high- - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 CISA and the National Security Agency (NSA) have published a joint cybersecurity advisory about control system defense for operational technology (OT) and industrial control systems (ICSs). Control System Defense: Know the Opponent is intended to provide critical infrastructure owners and - Read More
 
September 24th, 2022 | Jay Ferron | My information Resource
 NIST’s Cybersecurity for the Internet of Things (IoT) program has released two new documents: The final version of Profile of the IoT Core Baseline for Consumer IoT Products (NIST IR 8425). The public draft (June 2022) took the consumer IoT cybersecurity criteria from our February - Read More
 

Pages