IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
July 7th, 2022 | Jay Ferron | My information Resource
This Public Service Announcement is an update and companion piece to Business Email Compromise PSA I-091019-PSA posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center complaint information and updated statistics from October 2013 to December 2021.DEFINITIONBusiness Email - Read More
 
July 7th, 2022 | Jay Ferron | My information Resource
The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions. Deepfakes include a video, an image, or recording convincingly - Read More
 
July 6th, 2022 | Jay Ferron | My information Resource
 This uses vulnerabilities in Remote Desktop Protocol (RDP) to access victims’ networksSummaryActions to take today to mitigate cyber threats from ransomware:• Prioritize remediating known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce - Read More
 
July 5th, 2022 | Jay Ferron | My information Resource
 NIST Announces the Release of Draft NIST IR 8323 Revision 1 | Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.  Credit: Shutterstock About Revision 1 of the Profile The PNT cybersecurity profile is part - Read More
 
July 5th, 2022 | Jay Ferron | My information Resource
 This is an IN-Person EventThe pandemic is (mostly) behind us now, but have perceptions and mindsets of city dwellers changed forever?Do young people see the world in the same way?Is there any evidence that people in cities now value work-life balance?At the Artificial Intelligence: Cloud and Edge - Read More
 
July 5th, 2022 | Jay Ferron | My information Resource
 Microsoft TrainingThe number of security incidents and information related to them are rising daily. Traditional tools and methods aren’t enough to process all the data and to respond to all the incidents. That is where SOAR (Security Orchestration, Automation, and Response) can help.Where to - Read More
 
July 5th, 2022 | Jay Ferron | My information Resource
NIST has completed the third round of the Post-Quantum Cryptography (PQC) standardization process, which selects public-key cryptographic algorithms to protect information through the advent of quantum computers. A total of four candidate algorithms have been selected for standardization: CRYSTALS- - Read More
 
July 5th, 2022 | Jay Ferron | My information Resource
The National Institute of Standards and Technology (NIST) has announced that a new post-quantum cryptographic standard will replace current public-key cryptography, which is vulnerable to quantum-based attacks. Note: the term “post-quantum cryptography” is often referred to as “quantum-resistant - Read More
 
June 25th, 2022 | Jay Ferron | My information Resource
 Submit Comments on Draft NIST SP 1800-34, Validating the Integrity of Computing Devices The National Cybersecurity Center of Excellence (NCCoE) has published for public comment a draft of NIST SP 1800-34, Validating the Integrity of Computing Devices. What Is This Guide About? Technologies today - Read More
 
June 17th, 2022 | Jay Ferron | My information Resource
 NIST is releasing the final public draft of a major revision to Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems. This final public draft offers significant content and design changes that include a renewed emphasis on the importance of systems engineering and - Read More
 

Pages