Michael Buckbee

Latest articles

The Difference Between Bash and Powershell

Michael Buckbee

Michael Buckbee

You don’t normally talk philosophy and IT when considering Bash and Powershell, but if it’s one thing I’ve learned over the past 20 years of sysadmin work it’s that whether...

The Complete PowerShell Tool Roundup

Michael Buckbee

Michael Buckbee

A hand-curated list of 70 tools to power up your workflow.

The Vulnerability of Things - IOSS 21

Michael Buckbee

Michael Buckbee

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...

HHS to Investigate Smaller HIPAA Privacy Breaches

Michael Buckbee

Michael Buckbee

As  a reader of this blog, you know all about Health and Human Services’ (HHS) wall of shame. That’s where breaches involving protected health information (PHI) affecting 500 or more...

New SamSam Ransomware Exploiting Old JBoss Vulnerability

Michael Buckbee

Michael Buckbee

One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware...

Six Authentication Experts You Should Follow

Michael Buckbee

Michael Buckbee

Our recent ebook shows what’s wrong with current password-based authentication technology. But luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people...

What is the Minimum Acceptable Risk Standards for Exchanges (MAR-E)?

Michael Buckbee

Michael Buckbee

Under the Affordable Care Act (ACA) of 2010, there are now online marketplaces to buy health insurance. These are essentially websites that allow consumers to shop around for an insurance...

Understanding Canada: Ontario’s New Medical Breach Notification Provision (and Other Canadian Data Privacy Facts)

Michael Buckbee

Michael Buckbee

Remember Canada’s profusion of data privacy laws? The Personal Information Protection and Electronic Documents Act (PIPEDA) is the law that covers all commercial organizations across Canada. Canadian federal government agencies,...

Banks Secretly and Silently Struggling with Ransomware

Michael Buckbee

Michael Buckbee

“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...

How to Identify Ransomware: Use Our New Identification Tool

Michael Buckbee

Michael Buckbee

Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...

How to Respond to a Cyber Security Incident

Michael Buckbee

Michael Buckbee

Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...

Is Browsing Facebook While in the Hospital a HIPAA Violation?

Michael Buckbee

Michael Buckbee

A recently filed federal class-action suit claims that several healthcare providers are violating HIPAA’s rules on protected health information (PHI). If the suit succeeds, privacy advocates say it has the potential...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.