Michael Buckbee

Latest articles

How to Create a Good Security Policy

Michael Buckbee

Michael Buckbee

CIOs have taken note of the nightmarish scenarios data breaches can bring – remember Sony and Target? To combat this ticking time bomb, they’ve beefed up their security budgets. The Computer...

SSL and TLS 1.0 No Longer Acceptable for PCI Compliance

Michael Buckbee

Michael Buckbee

The PCI Council released version 3.1 of their Data Security Standard (DSS), stating that SSL and TLS 1.0 can no longer be used after June 30, 2016.

Seven Free Data Wrangling Tools

Michael Buckbee

Michael Buckbee

Reformatting, de-duping, merging, and filtering are just some of the functions that go under the broad category of data wrangling. It’s all the scrubbing and cleaning that data scientists apply...

Privacy by Design Cheat Sheet

Michael Buckbee

Michael Buckbee

Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high...

Windows 10’s Security Reboot, Part III: FIDO and Beyond

Michael Buckbee

Michael Buckbee

FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not...

Interview With Alexandra Ross, The Privacy Guru

Michael Buckbee

Michael Buckbee

Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies...

Public Versus Private Cloud File Sharing: Pros and Cons

Michael Buckbee

Michael Buckbee

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same...

How to Detect Dropbox on Your Network

Michael Buckbee

Michael Buckbee

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list...

Windows 10’s Security Reboot, Part I: Authentication

Michael Buckbee

Michael Buckbee

There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos....

Someone Deleted My File. How Can I Find Out Who?

Michael Buckbee

Michael Buckbee

If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you...

Going Back To SQL Server 2008 In Order To Move Ahead

Michael Buckbee

Michael Buckbee

Last year, Microsoft ended its support for SQL 2008/R2. Customers with an enterprise agreement are still supported, but it’s a good idea to start planning your upgrade. Upgrading your production...

Inside the World of Insider Threats, Part I: Motivation

Michael Buckbee

Michael Buckbee

As someone once said in a different context, never let a good crisis go to waste. While we still don’t have definitive proof, there’s good evidence that employees were in...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.