IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
September 22nd, 2023 | Jay Ferron | My information Resource
iOS 17.0.1 and iPadOS 17.0.1 Released September 21, 2023 Kernel Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, iPad mini 5th - Read More
 
September 22nd, 2023 | Jay Ferron | My information Resource
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the - Read More
 
September 20th, 2023 | Jay Ferron | My information Resource
Featured New resource for role-based Microsoft Certification exams > Access to Microsoft Learn is now available as you complete your exam. During the exam, select the Microsoft Learn button on the exam question screen. This is available in all languages. (Blog post in English)   What’s New - Read More
 
September 20th, 2023 | Jay Ferron | My information Resource
Face recognition software is commonly used as a gatekeeper for accessing secure websites and electronic devices, but what if someone can defeat it by simply wearing a mask resembling another person’s face? Newly published research from the National Institute of Standards and Technology ( - Read More
 
September 20th, 2023 | Jay Ferron | My information Resource
This Joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and - Read More
 
September 19th, 2023 | Jay Ferron | My information Resource
Cisco Talos has published an open-source report regarding the North Korean state-sponsored actor, the Lazarus Group, reported to be targeting internet backbone infrastructure and healthcare entities in Europe and the United States. The attackers have been exploiting a vulnerability in ManageEngine - Read More
 
September 18th, 2023 | Jay Ferron | My information Resource
With a mention in the new National Cyber Workforce and Education Strategy and even a dedicated state law, K–12 cybersecurity education clearly has the eye of policymakers. However, despite public attention and new opportunities for high school students to pursue cybersecurity coursework, high - Read More
 
September 18th, 2023 | Jay Ferron | My information Resource
Multiple vulnerabilities have been discovered in Notepad++, the most severe of which could result in arbitrary code execution. Notepad++ is a free and open-source text and source code editor for use with Microsoft Windows. Successful exploitation of the most severe of these vulnerabilities could - Read More
 
September 18th, 2023 | Jay Ferron | My information Resource
Civil society organizations and other communities on the frontlines of the fight for democracy and human rights are frequently targets of Advanced Persistent Threats. These same organizations require additional support from the Federal government and the broader cybersecurity community to protect - Read More
 
September 18th, 2023 | Jay Ferron | My information Resource
Enterprise application environments consist of geographically distributed and loosely coupled microservices that span multiple cloud and on-premises environments. They are accessed by a userbase from different locations through different devices. This scenario calls for establishing trust in all - Read More
 

Pages