Intelligent Security

Secure Data and Manage Cybersecurity Risks

DISA STIG Requires Privilege Access Workstations (PAW) for Cloud Tenant Administration

DISA recently published a Security Technical Implantation Guide (STIG) updated in February mandating...

Author: Troy Arwine Date: 03/19/2018

Disable SMB v1 in Managed Environments with Group Policy

The following is a brief summary recent SMB v1 vulnerabilities, ransomware and an enterprise...

Author: Troy Arwine Date: 05/17/2017

Protecting a BIT of Integrity BYTES

Leveraging the NIST Cybersecurity Framework to apply necessary albeit painful and often...

Author: Troy Arwine Date: 07/07/2016

PKI Certificate Renewal Strategy: A Simple Cascading Schedule

Designing a strategy for Certificate Authority (CA) certificate renewal schedule can cause some...

Author: Troy Arwine Date: 08/21/2012

Driving Safely Online & Legislation of Technology: Mandating Hands-Free Availability Built Into All Vehicles Instead of Disabling or Banning Cell Phones

This 21st century world with its enumerable social gadgets intertwined on the Web make driving...

Author: Troy Arwine Date: 06/11/2012

The Value of Certificate Revocation Lists (CRLs) in a PKI

In Internet explorer, inside Tools --> Internet Options --> Advanced there are two controls...

Author: Troy Arwine Date: 02/09/2012

E-Gov Security Part 3 (Trusting the Cloud)

E-Government continues to grow with citizens demanding more online services daily and the...

Author: Troy Arwine Date: 02/18/2011

E-GOV Security (Part 2–Twenty Critical Cyber Defense Controls to Secure Citizen Data & Maintain Public Trust)

The National Association of State CIO’s (NASCIO) & Deloitte released findings from “The 2010...

Author: Troy Arwine Date: 12/22/2010

Free Microsoft Security Tools

I often get asked where someone can find a comprehensive list of Security tools from...

Author: Troy Arwine Date: 11/30/2009

Secure Applications - Part Deux

According to a study done by the Computer Security Institute and the FBI, 97% of interviewed...

Author: Troy Arwine Date: 10/10/2008

Defense-in-Depth vs. BitUnlocker: How to defeat Cold DRAM attacks using BitLocker, Power Options, and Physical Security

Princeton University published a paper this week entitled: Lest We Remember: Cold Boot Attacks on...

Author: Troy Arwine Date: 02/24/2008

You don't have to be a Rocket Scientist to stay safe online.

Simply following a few basic safety tips can minimize your risk of being hacked; having your...

Author: Troy Arwine Date: 07/17/2007