Michael Buckbee

Latest articles

3 Tips to Monitor and Secure Exchange Online

Michael Buckbee

Michael Buckbee

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...

Announcing Varonis Edge – to the Perimeter and Beyond

Michael Buckbee

Michael Buckbee

Email, web, and brute force attacks are the primary ways that malware gets through your defenses.  The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails.  Remote Access Trojans?...

How Varonis Levels Up Your Incident Response

Michael Buckbee

Michael Buckbee

Varonis arms your incident response team with expert playbooks on how to respond to common alerts, as well as a free IR service to help you when you need it most.

Kerberos Attack: Silver Ticket Edition

Michael Buckbee

Michael Buckbee

With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty...

8 Events That Changed Cybersecurity Forever

Michael Buckbee

Michael Buckbee

Milestone incidents are what made cybersecurity what it is today - these are the top 8 events that changed cybersecurity, and why they (still) matter.

Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!

Michael Buckbee

Michael Buckbee

Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the...

What is FISMA Compliance? Regulations and Requirements

Michael Buckbee

Michael Buckbee

FISMA is the federal government’s security requirements. If you work for on with a federal agency read on to learn how to get (and stay) compliant.

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Michael Buckbee

Michael Buckbee

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Kerberos Authentication Explained

Michael Buckbee

Michael Buckbee

Learn more about Kerberos Authentication, the widely-used authorization technology. Contact us today to learn how Varonis monitors Kerberos, and more.

The Difference Between E3 and E5 Office365 Features

Michael Buckbee

Michael Buckbee

Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...

PowerShell Array Guide: How to Use and Create

Michael Buckbee

Michael Buckbee

Learn how to best use PowerShell arrays — we'll cover the basics of how to create them, work with them as well as some more advanced techniques.

PowerShell Obfuscation: Stealth Through Confusion, Part II

Michael Buckbee

Michael Buckbee

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.