Michael Buckbee
Michael has worked as a sysadmin and software developer for Silicon Valley startups, the US Navy, and everything in between.
-
PowerShellSep 06, 2016
The Complete PowerShell Tool Roundup
A hand-curated list of 70 tools to power up your workflow.
Michael Buckbee
3 min read
-
Data SecuritySep 06, 2016
The Vulnerability of Things - IOSS 21
We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...
Michael Buckbee
1 min read
-
Privacy & ComplianceAug 23, 2016
HHS to Investigate Smaller HIPAA Privacy Breaches
As a reader of this blog, you know all about Health and Human Services’ (HHS) wall of shame. That’s where breaches involving protected health information (PHI) affecting 500 or more...
Michael Buckbee
1 min read
-
Data SecurityJul 21, 2016
Banks Secretly and Silently Struggling with Ransomware
“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...
Michael Buckbee
2 min read
-
Data SecurityJul 20, 2016
How to Identify Ransomware: Use Our New Identification Tool
Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...
Michael Buckbee
1 min read
-
Data SecurityJul 19, 2016
How to Respond to a Cyber Security Incident
Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...
Michael Buckbee
4 min read
-
Privacy & ComplianceJul 19, 2016
Is Browsing Facebook While in the Hospital a HIPAA Violation?
A recently filed federal class-action suit claims that several healthcare providers are violating HIPAA’s rules on protected health information (PHI). If the suit succeeds, privacy advocates say it has the potential...
Michael Buckbee
2 min read
-
Data SecurityJul 15, 2016
Layered Security - IOSS 14
Layered security refers to the practice of combining various security defenses to protect the entire system against threats. The idea is that if one layer fails, there are other functioning...
Michael Buckbee
17 min read
-
Privacy & ComplianceJun 24, 2016
GDPR: Pseudonymization as an Alternative to Encryption
Have I mentioned lately that the General Data Protection Regulation (GDPR) is a complicated law? Sure, there are some underlying principles, such as Privacy by Design (PbD) and other ideas,...
Michael Buckbee
3 min read
-
Data SecurityJun 20, 2016
What is The Cyber Kill Chain and How to Use it Effectively
The cyber kill chain maps the stages of a cyberattack from the early reconnaissance stages to data exfiltration. The cyber kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).
Michael Buckbee
4 min read
-
Data SecurityMay 23, 2016
How has Ransomware Impacted the US Government?
Ransomware crimes have been soaring this year. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state and local governments, law enforcement...
Michael Buckbee
3 min read
-
Data SecurityMay 16, 2016
Ransomware That Deletes Your Files
Organizations with legal obligations to prevent data from improper alteration or destruction—I’m talking to you healthcare orgs that fall under HIPAA– really need to pay close attention to a new...
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital