Michael Buckbee

Latest articles

Australian Privacy Act 2022 Updates

Michael Buckbee

Michael Buckbee

A series of stunning data breaches in 2022 has prompted lawmakers to begin making changes to the 1988 Australian Privacy Act in the form of the new Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022.

What Is Zero Trust? Architecture and Security Guide

Michael Buckbee

Michael Buckbee

Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.

What is Mimikatz? The Beginner's Guide

Michael Buckbee

Michael Buckbee

Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.

What is a Brute Force Attack? Definition

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.

What is a Brute Force Attack?

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.

What is PCI Compliance: Requirements and Penalties

Michael Buckbee

Michael Buckbee

PCI compliance provides businesses with guidance on protecting customer credit card information and cut down on credit card fraud. Read on to find out how to protect your company from fines and breaches.

Data Migration Guide: Strategy Success & Best Practices

Michael Buckbee

Michael Buckbee

Wondering what you need to know about data migration? Our guide to success will provide you with all the information you're looking for! 

What is an SMB Port + Ports 445 and 139 Explained

Michael Buckbee

Michael Buckbee

An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.

5 Data Governance Reports for Data Owners

Michael Buckbee

Michael Buckbee

This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...

How Varonis Limits Organization-Wide Exposure

Michael Buckbee

Michael Buckbee

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

What is Data Integrity and How Can You Maintain it?

Michael Buckbee

Michael Buckbee

Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here. 

What is Data Classification? Guidelines and Process

Michael Buckbee

Michael Buckbee

Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.

Prev

1 2 3 4 5

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.