IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
May 4th, 2022 | Jay Ferron | My information Resource
The National Cybersecurity Center of Excellence (NCCoE) announces the release of NIST Internal Report (NISTIR) 8320, Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases.NISTIR 8320 explains hardware-enabled security techniques and - Read More
 
April 27th, 2022 | Jay Ferron | My information Resource
 CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), and the United Kingdom’s National Cyber Security Centre (NCSC- - Read More
 
April 27th, 2022 | Jay Ferron | My information Resource
 Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could allow an attacker to elevate privileges to root on many Linux desktop endpoints. The vulnerabilities can be chained together to gain root privileges on Linux systems, allowing attackers to deploy - Read More
 
April 26th, 2022 | Jay Ferron | My information Resource
 The National Cybersecurity Center of Excellence (NCCoE) has released a new preliminary draft publication, Special Publication (SP) 1800-33 Volume B, 5G Cybersecurity: Approach, Architecture, and Security Characteristics. Commercial mobile network operators, potential private 5G network operators, - Read More
 
April 22nd, 2022 | Jay Ferron | My information Resource
 The National Initiative for Cybersecurity Education (NICE) is continuing to refine and clarify the Workforce Framework for Cybersecurity (NICE Framework) as a fundamental reference resource that is agile, flexible, modular, and interoperable. As such, a review of the NICE Framework data - - Read More
 
April 21st, 2022 | Jay Ferron | My information Resource
 This FLASH is part of a series of FBI reports to disseminate known indicators of compromise (IOCs) and tactics, techniques and procedures (TTPs) associated with ransomware variants identified through FBI investigations. As of March 2022, BlackCat/ALPHV ransomware as a service (RaaS) had - Read More
 
April 21st, 2022 | Jay Ferron | My information Resource
 The National Cybersecurity Center of Excellence (NCCoE) announces the release of three related publications on trusted cloud and hardware-enabled security. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be - Read More
 
April 21st, 2022 | Jay Ferron | My information Resource
  The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory (CSA) to warn organizations that Russia’s invasion of Ukraine could expose organizations both within and beyond the region to - Read More
 
April 21st, 2022 | Jay Ferron | My information Resource
ESET researchers have discovered and analyzed three vulnerabilities affecting various Lenovo consumer laptop models. The first two of these vulnerabilities – CVE-2021-3971, CVE-2021-3972 – affect UEFI firmware drivers originally meant to be used only during the manufacturing process of Lenovo - Read More
 
April 21st, 2022 | Jay Ferron | My information Resource
Highlights: ·        Check Point Research discovered vulnerabilities in the ALAC format that could have led an attacker to remotely get access to its media and audio conversations ·        MediaTek and Qualcomm, the two largest mobile chipset manufacturers in the world, used the ALAC audio coding - Read More
 

Pages