Intelligent Security

Secure Data and Manage Cybersecurity Risks

DISA STIG Requires Privilege Access Workstations (PAW) for Cloud Tenant Administration

DISA recently published a Security Technical Implantation Guide (STIG) updated in February mandating...

Author: Troy Arwine Date: 03/19/2018

Disable SMB v1 in Managed Environments with Group Policy

The following is a brief summary recent SMB v1 vulnerabilities, ransomware and an enterprise...

Author: Troy Arwine Date: 05/17/2017

Protecting a BIT of Integrity BYTES

Leveraging the NIST Cybersecurity Framework to apply necessary albeit painful and often...

Author: Troy Arwine Date: 07/07/2016

Secure Design & Operations vs. reliance on Security Software and Signature-based Systems

IT security has never been more critical, the threat so great and IT defenses so...

Author: Troy Arwine Date: 07/23/2013

PKI Certificate Renewal Strategy: A Simple Cascading Schedule

Designing a strategy for Certificate Authority (CA) certificate renewal schedule can cause some...

Author: Troy Arwine Date: 08/21/2012

Driving Safely Online & Legislation of Technology: Mandating Hands-Free Availability Built Into All Vehicles Instead of Disabling or Banning Cell Phones

This 21st century world with its enumerable social gadgets intertwined on the Web make driving...

Author: Troy Arwine Date: 06/11/2012

The Value of Certificate Revocation Lists (CRLs) in a PKI

In Internet explorer, inside Tools --> Internet Options --> Advanced there are two controls...

Author: Troy Arwine Date: 02/09/2012

Mitigating Photo GeoTagging Safety Concerns with Windows Phone 7 Privacy Settings & Pro Photo Tools

Photo GeoTagging seems to be making headlines this week and bring to our attention the potential...

Author: Troy Arwine Date: 02/25/2011

E-Gov Security Part 3 (Trusting the Cloud)

E-Government continues to grow with citizens demanding more online services daily and the...

Author: Troy Arwine Date: 02/18/2011

E-GOV Security (Part 2–Twenty Critical Cyber Defense Controls to Secure Citizen Data & Maintain Public Trust)

The National Association of State CIO’s (NASCIO) & Deloitte released findings from “The 2010...

Author: Troy Arwine Date: 12/22/2010

E-GOV Security (Part 1–Data Loss Prevention)

State & Local Government (SLG) is quickly adopting to demands of 21st century U.S. citizens...

Author: Troy Arwine Date: 10/22/2010

Free Microsoft Security Tools

I often get asked where someone can find a comprehensive list of Security tools from...

Author: Troy Arwine Date: 11/30/2009

Flying Pigs at the Turn of the Tide: Microsoft is finally emerging as a leader the cyber security industry

Microsoft has been dealing with cyber treats for years both internally and with our customers, but...

Author: Troy Arwine Date: 06/23/2009

Secure Applications - Part Deux

According to a study done by the Computer Security Institute and the FBI, 97% of interviewed...

Author: Troy Arwine Date: 10/10/2008

Defense-in-Depth vs. BitUnlocker: How to defeat Cold DRAM attacks using BitLocker, Power Options, and Physical Security

Princeton University published a paper this week entitled: Lest We Remember: Cold Boot Attacks on...

Author: Troy Arwine Date: 02/24/2008

Home Router Hacks, VOIP Phishing & Driveby Pharming

A new era is dawning in mainstream hacking techniques that target devices that are not very well...

Author: Troy Arwine Date: 01/24/2008

Secure Web Applications - The Microsoft Way

A question came up this week on how to Secure Web Applications the Microsoft way. Microsoft has...

Author: Troy Arwine Date: 11/29/2007

Why Social Engineering always works :(

What is Social Engineering & why should you care? Social engineering (security) - a definition...

Author: Troy Arwine Date: 08/07/2007

Online Internet Safety Resources

Here are some resources from the Microsoft' Internet Safety Toolkit below to help keep you kids and...

Author: Troy Arwine Date: 07/30/2007

Espionage & Counter Intelligence for the "Average Joe"

Today in the news there was a story of a major security breach where nuclear secrets were stolen...

Author: Troy Arwine Date: 07/19/2007

You don't have to be a Rocket Scientist to stay safe online.

Simply following a few basic safety tips can minimize your risk of being hacked; having your...

Author: Troy Arwine Date: 07/17/2007