IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
March 7th, 2020 | Jay Ferron
 
Blog Entry
March 7th, 2020 | Jay Ferron
    Cloud security is as important as ever as more and more services are moved to the cloud. Unfortunately misconfigured servers still exist, regardless of where they are located. A simple Google search (no Shodan required) is all it takes to find unsecured S3 buckets, which can be treasure troves of information. Let's be real though, that type of find is low-hanging fruit that any script kiddie or automated tool can find. - read more
 
Blog Entry
March 7th, 2020 | Jay Ferron
    Wireless network security has come a long way since the days of easily breakable Wired Equivalent Privacy (WEP). WiFi Protected Access (WPA) 2 has been the most commonly used standard since it was released in 2004 and has had very few vulnerabilities since the original release. - read more
 
Blog Entry
March 7th, 2020 | Jay Ferron
    The popular free Certificate Authority (CA), Let’s Encrypt, will be revoking mil-lions of certificates that enable Transport Layer Security (TLS), the subsequent protection of data between machines, and the positive identification of services for their customers. Digital certificates bind a public cryptographic key to a name. It binds it to a domain name in the case of web traffic utilizing the HTTPS protocol. - read more
 
Blog Entry
March 7th, 2020 | Jay Ferron
     Apache Tomcat has been a popular Java servlet hosting application for over 20 years. It is used to host hundreds of thousands of websites and web applications. - read more
 
Blog Entry
February 22nd, 2020 | Jay Ferron
For you security professions this is a great site to get guidance and software.  The software listed here developed within the National Security Agency and is available to the public for use. I encourage you to check it out! - read more
 
Blog Entry
February 22nd, 2020 | Jay Ferron
    The National Security Agency released the source code of Ghidra, its reverse engineering tool.     This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to collaborate by creating patches, and extending the tool to fit their cybersecurity needs. - read more
 
Blog Entry
February 22nd, 2020 | Jay Ferron
 Details of 10.6 million MGM hotel guests posted on a hacking forum  - read more
 
Blog Entry
February 22nd, 2020 | Jay Ferron
    We expect services to protect themselves from fraudulent activity. - read more
 
Blog Entry
February 22nd, 2020 | Jay Ferron
    Many people believe that cybersecurity training and awareness isn’t important in their jobs, especially if their role isn’t technical. However, social engineering has led to the human element being the weakest link in the cybersecurity chain and attackers can be very resourceful and clever in their attempts. A recent attack on a U.S. - read more
 

Pages

Subscribe to My Information Resource