Intelligent Security
Secure Data and Manage Cybersecurity Risks
DISA STIG Requires Privilege Access Workstations (PAW) for Cloud Tenant Administration
DISA recently published a Security Technical Implantation Guide (STIG) updated in February mandating...
Date: 03/19/2018
Disable SMB v1 in Managed Environments with Group Policy
The following is a brief summary recent SMB v1 vulnerabilities, ransomware and an enterprise...
Date: 05/17/2017
Protecting a BIT of Integrity BYTES
Leveraging the NIST Cybersecurity Framework to apply necessary albeit painful and often...
Date: 07/07/2016
PKI Certificate Renewal Strategy: A Simple Cascading Schedule
Designing a strategy for Certificate Authority (CA) certificate renewal schedule can cause some...
Date: 08/21/2012
Driving Safely Online & Legislation of Technology: Mandating Hands-Free Availability Built Into All Vehicles Instead of Disabling or Banning Cell Phones
This 21st century world with its enumerable social gadgets intertwined on the Web make driving...
Date: 06/11/2012
The Value of Certificate Revocation Lists (CRLs) in a PKI
In Internet explorer, inside Tools --> Internet Options --> Advanced there are two controls...
Date: 02/09/2012
E-Gov Security Part 3 (Trusting the Cloud)
E-Government continues to grow with citizens demanding more online services daily and the...
Date: 02/18/2011
E-GOV Security (Part 2–Twenty Critical Cyber Defense Controls to Secure Citizen Data & Maintain Public Trust)
The National Association of State CIO’s (NASCIO) & Deloitte released findings from “The 2010...
Date: 12/22/2010
Free Microsoft Security Tools
I often get asked where someone can find a comprehensive list of Security tools from...
Date: 11/30/2009
Secure Applications - Part Deux
According to a study done by the Computer Security Institute and the FBI, 97% of interviewed...
Date: 10/10/2008
Defense-in-Depth vs. BitUnlocker: How to defeat Cold DRAM attacks using BitLocker, Power Options, and Physical Security
Princeton University published a paper this week entitled: Lest We Remember: Cold Boot Attacks on...
Date: 02/24/2008
You don't have to be a Rocket Scientist to stay safe online.
Simply following a few basic safety tips can minimize your risk of being hacked; having your...
Date: 07/17/2007