IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
January 21st, 2023 | Jay Ferron | My information Resource
This is a post from Microsoft. On January 13th, Windows Security and Microsoft Defender for Endpoint customers may have experienced a series of false positive detections for the Attack Surface Reduction (ASR) rule "Block Win32 API calls from Office macro" after updating to security intelligence - Read More
 
January 21st, 2023 | Jay Ferron | My information Resource
 Ever wanted to do a practice test before sitting for a Microsoft certification? You are in luck as Microsoft is starting to offer free practice tests for Microsoft certifications directly on Microsoft Learn!Practice Tests released on Microsoft Learn  Working on your certification goals and looking - Read More
 
January 21st, 2023 | Jay Ferron | My information Resource
Cybersecurity Framework 2.0 Concept Paper: The NIST Cybersecurity Framework (CSF) helps organizations better understand, manage, reduce, and communicate cybersecurity risks. NIST is updating the CSF to keep pace with the evolving cybersecurity landscape.  The CSF 2.0 Concept Paper - Read More
 
January 21st, 2023 | Jay Ferron | My information Resource
 On December 5, 2022, the National Cybersecurity Center of Excellence (NCCoE) released for public comment the preliminary draft of NIST Special Publication (SP) 1800-36A: Executive Summary, Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management. The public comment - Read More
 
January 14th, 2023 | Jay Ferron | My information Resource
The automotive industry is facing significant challenges from increased cybersecurity risk and adoption of AI and opportunities from rapid technological innovations. NIST is setting up this community of interest (COI) to allow the industry to discuss, comment, and provide input on the work that - Read More
 
January 14th, 2023 | Jay Ferron | My information Resource
 NIST is announcing the initial public drafts of NIST SP 800-157r1 (Revision 1), Guidelines for Derived Personal Identity Verification (PIV) Credentials, and NIST SP 800-217, Guidelines for Personal Identity Verification (PIV) Federation. These two SPs complement Federal Information Processing - Read More
 
January 8th, 2023 | Jay Ferron | My information Resource
Ransomware continues to be one of the most prevalent and impactful threats affecting organizations, with attackers constantly evolving their techniques and expanding their tradecraft to cast a wider net of potential targets. This is evident in the range of industries, systems, and platforms - Read More
 
January 8th, 2023 | Jay Ferron | My information Resource
 In case you did not spend the holiday season watching the Federal Register, the National Cybersecurity Center of Excellence (NCCoE) issued a Federal Register Notice inviting industry participants and other interested collaborators to participate in the Responding to and Recovering from a Cyber - Read More
 
January 8th, 2023 | Jay Ferron | My information Resource
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has published the second version of volumes A-D and the first version of volume E of a preliminary draft practice guide titled “Implementing a Zero Trust Architecture” and is seeking the public’s - Read More
 
January 8th, 2023 | Jay Ferron | My information Resource
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines.  Currently, we are reviewing the following publication:  NIST Special Publication (SP) 800-132, Recommendation for Password-Based Key Derivation: Part 1: Storage Applications, - Read More
 

Pages