IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
November 30th, 2022 | Jay Ferron
FREE TRAINING Microsoft training for Security Engineers Secure your systems and protect your data - read more
 
Blog Entry
November 30th, 2022 | Jay Ferron
 The Mobile Device Security Team at NIST’s National Cybersecurity Center of Excellence (NCCoE) has published the second draft of - read more
 
Blog Entry
November 22nd, 2022 | Jay Ferron
 Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure networks and devices. External tools and products that are managed by vendors and developers can pose a security risk, especially to targets in sensitive industries. - read more
 
Blog Entry
November 22nd, 2022 | Jay Ferron
  - read more
 
Blog Entry
November 19th, 2022 | Jay Ferron
NIST has published NIST Internal Report (IR) 8409, - read more
 
Blog Entry
November 19th, 2022 | Jay Ferron
What: "Special Topics on Privacy and Public Auditability" (STPPA) — Event 4. - read more
 
Blog Entry
November 19th, 2022 | Jay Ferron
 As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an increase in attackers utilizing token theft for this purpose. - read more
 
Blog Entry
November 19th, 2022 | Jay Ferron
 NIST has published Special Publication (SP) 800-215, - read more
 
Blog Entry
November 19th, 2022 | Jay Ferron
 Business impact analyses (BIAs) have been traditionally used for business continuity and disaster recovery (BC/DR) planning to understand the potential impacts of outages that compromise IT infrastructure. However, BIA analyses can be easily expanded to consider outages related to cyber risks and issues attributable to confidentiality and integrity. - read more
 

Pages

Subscribe to Technology