
Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.
-
Data Security
Mar 25, 2021
How to Use Netcat Commands: Examples and Cheat Sheets
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Michael Buckbee
7 min read
-
Data Security
Mar 10, 2021
Detecting Honeypot Access With Varonis
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
Michael Buckbee
3 min read
-
Active Directory Data Security
Feb 19, 2021
Group Policy Editor Guide: Access Options and How to Use
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Michael Buckbee
4 min read
-
Privacy & Compliance
Jan 29, 2021
Risk Management Framework (RMF): An Overview
The Risk Management Framework is a set of criteria for securing US Government IT Systems. In this guide, we’ll explain the RMF and how to implement it.
Michael Buckbee
6 min read
-
Data Security
Jan 29, 2021
What is DNS, How it Works + Vulnerabilities
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Michael Buckbee
9 min read
-
Active Directory Data Security PowerShell
Jan 29, 2021
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
Michael Buckbee
13 min read
-
Data Security Privacy & Compliance
Dec 22, 2020
5 Priorities for the CISO Budget In 2021
Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.
Michael Buckbee
8 min read
-
Data Security
Nov 23, 2020
What is a Port Scanner and How Does it Work?
Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.
Michael Buckbee
7 min read
-
Data Security
Nov 13, 2020
Finding Data Owners with Varonis
Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.
Michael Buckbee
4 min read
-
Security Bulletins
Oct 23, 2020
The Saga of Trickbot
This is the never-ending story of Trickbot ransomware: the threat, the "takedown," the reboot, the hero. Is Trickbot a threat to democracy? Read on.
Michael Buckbee
6 min read
-
Data Security
Oct 19, 2020
What is DNS Tunneling? A Detection Guide
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Michael Buckbee
4 min read
-
Data Security
Oct 07, 2020
How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests
Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital