IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
November 22nd, 2022 | Jay Ferron | My information Resource
 Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure networks and devices. External tools and products that are managed by vendors and developers can pose a security risk, especially to targets in - Read More
 
November 22nd, 2022 | Jay Ferron | My information Resource
  Expand your Windows Server skill set to open new opportunities for your org to innovate and operate more efficiently—while also improving security. Join us at this exciting digital event for sessions and demos on how to save more money and time using Windows Server - Read More
 
November 22nd, 2022 | Jay Ferron | My information Resource
The National Institute of Standards and Technology (NIST) has finalized a report, first published in draft form in May, that reviews the scientific foundations of forensic methods for analyzing computers, mobile phones and other electronic devices.  The finalized report, Digital - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
NIST has published NIST Internal Report (IR) 8409, Measuring the Common Vulnerability Scoring System Base Score Equation. Calculating the severity of information technology vulnerabilities is important for prioritizing vulnerability remediation and helping to understand the risk of a vulnerability - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
What: "Special Topics on Privacy and Public Auditability" (STPPA) — Event 4. New date - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 NIST has published Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape. Access to multiple cloud services (e.g., IaaS, SaaS), the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers and multiple branch offices), and - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
 Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts of outages that compromise IT infrastructure. However, BIA analyses can be easily expanded to consider outages related to cyber risks and - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
NIST has released a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final publication offers significant content and design changes that include a renewed emphasis on the importance of systems engineering and viewing systems security - Read More
 
November 19th, 2022 | Jay Ferron | My information Resource
Holiday Travel Tip: Use Public Wi-Fi Safely The NCCoE Buzz: Mobile Security Edition is a recurring email on timely topics in mobile device cybersecurity and privacy from the National Cybersecurity Center of Excellence’s (NCCoE’s) Mobile Device Security project team. It’s that time of the year - Read More
 

Pages