IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
July 20th, 2022 | Jay Ferron
 Comment Period Extended for NIST SP 1800-34, Validating the Integrity of Computing Devices - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 Today, NIST is seeking public comments on NIST IR 8409 ipd (initial public draft), - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines.    - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery (BC/DR) by triaging damaged infrastructure recovery actions that are primarily based on the duration and cost of system outages (i.e., availability compromise). However, BIA analyses can be easily expanded to consider other cyber-risk compromises and remedies. - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
NIST is leveraging the new Special Publication (SP) 800-53 Public Comment Site for its first round of public comments. - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
Protecting Controlled Unclassified Information: Pre-Draft Call for Comments on the CUI Series - read more
 
Blog Entry
July 18th, 2022 | Jay Ferron
A Florida-based CEO was charged with selling $1 billion worth of counterfeit Cisco equipment imported from China, according to the Department of Justice.   - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE)  - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
This Public Service Announcement is an update and companion piece to Business Email Compromise PSA I-091019-PSA posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center complaint information and updated statistics from October 2013 to December 2021. - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions. Deepfakes include a video, an image, or recording convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said. - read more
 

Pages

Subscribe to Tips and Advice