
Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.
-
Privacy & Compliance
Jun 17, 2020
Frequently Asked Questions (FAQ): GDPR and HR/Employee Data
As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...
Michael Buckbee
6 min read
-
Data Security
Jun 17, 2020
Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I
In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....
Michael Buckbee
6 min read
-
Data Security
Jun 17, 2020
Endpoint Detection and Response (EDR): Everything You Need to Know
Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2020
The Difference Between Data Governance and IT Governance
Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit
After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...
Michael Buckbee
3 min read
-
Active Directory Data Security
Jun 17, 2020
What is an Active Directory Forest?
An Active Directory forest is the top most logical container in an Active Directory configuration that contains domains, users, computers, and group policies.
Michael Buckbee
4 min read
-
Data Security Privacy & Compliance
Jun 17, 2020
Wyden's Consumer Data Protection Act: How to Be Compliant
Will 2019 be the year the US gets its own GDPR-like privacy law? Since my last post in this series, privacy legislation is becoming more certain to pass. Leaders from...
Michael Buckbee
4 min read
-
Data Security
Jun 17, 2020
Understanding Security Analytics Platforms
I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...
Michael Buckbee
5 min read
-
Data Security
Jun 17, 2020
Windows Defender Turned Off by Group Policy [Solved]
Windows Defender is a common AV solution, and attackers know how to work-around it. Learn how to turn Defender back on with this easy tutorial.
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
PowerShell for Pentesters: Scripts, Examples and Tips
This PowerShell for Pentesters' guide covers running commands, coding, tutorials and examples as well as the benefits of pentesting with PowerShell.
Michael Buckbee
5 min read
-
Data Security
Jun 17, 2020
Add Varonis to IAM for Better Access Governance
Managing permissions is a colossal job fraught with peril, and over-permissive folders are the bane of InfoSec and a hacker’s delight. Many organizations employ IAM (Identity Access Management) to help...
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
What is CASB? All About Cloud Access Security Brokers
Cloud Access Security Brokers (CASBs) are a great cybersecurity tool. Read on to learn about CASBs work, the solutions they offer and how to choose one.
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital