Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot. Learn more

Michael Buckbee

Latest articles

Data Security 2017: We’re All Hacked

Michael Buckbee

Michael Buckbee

Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there...

A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable

Michael Buckbee

Michael Buckbee

Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...

Solving The Cybersecurity Skills Shortage Within Your Organization

Michael Buckbee

Michael Buckbee

As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business

Varonis DatAlert and IBM QRadar

Michael Buckbee

Michael Buckbee

Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar. The Varonis App for QRadar adds context and security analytics to simplify investigations, streamline threat detection, and build...

Data Classification Labels: Integrating with Microsoft Information Protection (MIP)

Michael Buckbee

Michael Buckbee

We’re thrilled to announce the beta release of Data Classification Labels: integrating with Microsoft Information Protection (MIP) to enable users to better track and secure sensitive files across enterprise data...

Automating Permissions Cleanup: An In-Depth ROI Analysis

Michael Buckbee

Michael Buckbee

Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...

We Need to Talk About Gramm-Leach-Bliley (GLB): The Safeguards Rule Will Be Changing!

Michael Buckbee

Michael Buckbee

As a blogger following data security laws and regulations, I’m occasionally rewarded with an “I told you this law would be important” moment.  Earlier this month with the news that...

Koadic: Pen Testing, Pivoting, & JavaScripting, Part II

Michael Buckbee

Michael Buckbee

Mshta and rundll32, the Windows binaries that Koadic leverages, have been long known to hackers. If you take a peek at Mitre’s ATT&CK database, you’ll see that rundll32 has been...

Active Directory Domain Services (AD DS): Overview and Functions

Michael Buckbee

Michael Buckbee

Active Directory Domain Services (AD DS) are the core functions that make AD work. Learn more about AD DS and how to defend AD against cyber attacks.

The Future of Cybersecurity Budgeting

Michael Buckbee

Michael Buckbee

How has spending on cybersecuirty changed over the years? See what companies are prioritizing in their budgets and our tips for managing your own budget.

What is Security Analytics? Guide for the Non-Analytical

Michael Buckbee

Michael Buckbee

Security analytics is the practice of analyzing raw security data to discover preemptive and actionable security measures to increase cybersecurity. It’s not necessarily a particular technique, but certainly involves aggregating...

The Difference between a Computer Virus and Computer Worm

Michael Buckbee

Michael Buckbee

Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.