
Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.
-
Privacy & Compliance
Dec 19, 2022
Australian Privacy Act 2022 Updates
A series of stunning data breaches in 2022 has prompted lawmakers to begin making changes to the 1988 Australian Privacy Act in the form of the new Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022.
Michael Buckbee
3 min read
-
Data Security
Sep 09, 2022
What Is Zero Trust? Architecture and Security Guide
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.
Michael Buckbee
8 min read
-
Data Security
Aug 26, 2022
What is Mimikatz? The Beginner's Guide
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.
Michael Buckbee
4 min read
-
Data Security
Dec 08, 2021
What is a Brute Force Attack? Definition
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.
Michael Buckbee
4 min read
-
Data Security
Jul 20, 2021
What is a Brute Force Attack?
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.
Michael Buckbee
4 min read
-
Privacy & Compliance
Jul 20, 2021
What is PCI Compliance: Requirements and Penalties
PCI compliance provides businesses with guidance on protecting customer credit card information and cut down on credit card fraud. Read on to find out how to protect your company from fines and breaches.
Michael Buckbee
4 min read
-
Data Security
Jul 19, 2021
Data Migration Guide: Strategy Success & Best Practices
Wondering what you need to know about data migration? Our guide to success will provide you with all the information you're looking for!
Michael Buckbee
7 min read
-
Data Security
May 07, 2021
What is an SMB Port + Ports 445 and 139 Explained
An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.
Michael Buckbee
2 min read
-
Data Security
Apr 27, 2021
5 Data Governance Reports for Data Owners
This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...
Michael Buckbee
3 min read
-
Data Security
Apr 07, 2021
How Varonis Limits Organization-Wide Exposure
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2021
What is Data Integrity and How Can You Maintain it?
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
Michael Buckbee
4 min read
-
Data Security
Mar 25, 2021
What is Data Classification? Guidelines and Process
Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.
Michael Buckbee
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital