Michael Buckbee

Latest articles

Windows PowerShell vs. CMD: What's The Difference?

Michael Buckbee

Michael Buckbee

PowerShell is Microsoft’s updated shell that replaced the previous command prompt (CMD). Learn how to take advantage of cmdlets, piping, and third-party extensions.

Windows PowerShell Scripting Tutorial For Beginners

Michael Buckbee

Michael Buckbee

New to PowerShell scripting? Explore these scripting tutorials to learn to write and execute basic scripts, PowerShell cmdlets, aliases, pipes and more.

GDPR Requirements in Plain English

Michael Buckbee

Michael Buckbee

You just want to answer the question: “What do I need to do for GDPR?” Maybe you've worked your way through a few online quizzes to test for GDPR readiness or skimmed an article that made some vague suggestions. Learn the GDPR requirements.

24 Essential Penetration Testing Tools in 2020

Michael Buckbee

Michael Buckbee

A collection of the top penetration testing tools along with their best uses and supported platforms to help you find the pentesting tool you need.

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Michael Buckbee

Michael Buckbee

Achieving compliance with HIPAA, PCI, GDPR, and CCPA regulations in your Azure system can be complex. In this guide, we’ll show you how.

Is Microsoft Office 365 HIPAA Compliant?

Michael Buckbee

Michael Buckbee

Microsoft Office 365 is growing in popularity, but it can present some challenges to HIPAA compliance. Read on to learn more about Office 365 HIPAA compliance

What is PGP Encryption and How Does It Work?

Michael Buckbee

Michael Buckbee

PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it

What is Fileless Malware? PowerShell Exploited

Michael Buckbee

Michael Buckbee

Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.

Top 5 Remote Work Security Threats

Michael Buckbee

Michael Buckbee

COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.

Active Directory Users and Computers (ADUC): Installation and Uses

Michael Buckbee

Michael Buckbee

Active Directory Users and Computers (ADUC) is a MMC snap-in you can use to manage Active Directory. Read on for more details, use cases, and caveats.

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

Michael Buckbee

Michael Buckbee

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

CryptoLocker: Everything You Need to Know

Michael Buckbee

Michael Buckbee

CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.