
Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.
-
Privacy & Compliance
Mar 29, 2020
GDPR: The Right to Be Forgotten and AI
One (of the many) confusing aspects of the EU General Data Protection Regulation (GDPR) is its “right to be forgotten”. It’s related to the right to erasure but takes in far...
Michael Buckbee
3 min read
-
Privacy & Compliance
Mar 29, 2020
NYDFS Cybersecurity Regulation in Plain English
Learn about the new NYDFS cybersecurity regulation and the rules for basic principles of data security, documentation of security policies, and much more.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
12 Ways Varonis Helps You Manage Mergers and Acquisitions
A well-constructed Merger & Acquisition (M&A) playbook reduces the overall time, cost and risk of the upcoming merger and/or acquisition. Gartner advises that organizations who intend to grow through acquisitions...
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
CISM vs. CISSP Certification: Which One is Best for You?
CISM and CISSP are two of the most highly regarded certifications for cybersecurity leaders and practitioners, but their requirements aren’t trivial. Both require a significant investment of time and money – so It’s important to determine which is right for you. Take a look at our comparison of the two to learn more.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Koadic: Implants and Pen Testing Wisdom, Part III
One of the benefits of working with Koadic is that you too can try your hand at making enhancements. The Python environment with its nicely organized directory structures lends itself to...
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
What is a DDoS Attack? Identifying Denial-of-Service Attacks
Distributed Denial-of-service (DDoS) attacks are disruptive and costly. Learn more about DDoS attacks and how you can better protect your network.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Varonis Gets Lightning Fast with Solr
Any security practitioner that has had to perform forensic analysis on a cybersecurity incident likely describes the process as “searching for a needle in a stack of needles.” Even Tony...
Michael Buckbee
2 min read
-
Data Security
Mar 29, 2020
Browsing Anonymously: Is It Really Anonymous?
What can tools like private browsing and VPNs really deliver in terms of privacy? See for yourself as we take a deep dive into popular privacy tools
Michael Buckbee
5 min read
-
Active Directory
Mar 29, 2020
Active Directory Migration Tool (ADMT): Your Essential Guide
The Active Directory Migration Tool is a Microsoft tool that makes it easy to move AD objects to other domains or forests. Read on to learn how to use ADMT.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
Security Risk Analysis Is Different From Risk Assessment
At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
Analyzing Company Reputation After a Data Breach
Does a data breach affect how your customers see you? Take a look at what Americans think as we dive into the relationship between breaches and reputation.
Michael Buckbee
9 min read
-
Data Security
Mar 29, 2020
What Would The World’s Data Look Like if it Were Physical?
Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital