Michael Buckbee

Latest articles

How to Use Netcat Commands: Examples and Cheat Sheets

Michael Buckbee

Michael Buckbee

Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.

Detecting Honeypot Access With Varonis

Michael Buckbee

Michael Buckbee

Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...

Group Policy Editor Guide: Access Options and How to Use

Michael Buckbee

Michael Buckbee

Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.

Risk Management Framework (RMF): An Overview

Michael Buckbee

Michael Buckbee

The Risk Management Framework is a set of criteria for securing US Government IT Systems. In this guide, we’ll explain the RMF and how to implement it.

What is DNS, How it Works + Vulnerabilities

Michael Buckbee

Michael Buckbee

What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Michael Buckbee

Michael Buckbee

WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.

5 Priorities for the CISO Budget In 2021

Michael Buckbee

Michael Buckbee

Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.

What is a Port Scanner and How Does it Work?

Michael Buckbee

Michael Buckbee

Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.

What is Role-Based Access Control (RBAC)?

Michael Buckbee

Michael Buckbee

Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we’ll explain what RBAC is, and how to implement it.

Finding Data Owners with Varonis

Michael Buckbee

Michael Buckbee

Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.

The Saga of Trickbot

Michael Buckbee

Michael Buckbee

This is the never-ending story of Trickbot ransomware: the threat, the "takedown," the reboot, the hero. Is Trickbot a threat to democracy? Read on.

What is DNS Tunneling? A Detection Guide

Michael Buckbee

Michael Buckbee

Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.