Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Michael Buckbee

Latest articles

What is a Domain Controller, When is it Needed + Set Up

Michael Buckbee

Michael Buckbee

Domain controllers are common targets of attackers. Learn how to protect and secure your domain controllers to prevent data breaches.

Working With Windows Local Administrator Accounts, Part II

Michael Buckbee

Michael Buckbee

Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...

Finding EU Personal Data With Regular Expressions (Regexes)

Michael Buckbee

Michael Buckbee

If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...

Introducing Our New DataPrivilege API and a Preview of Our Upcoming GDPR Patterns

Michael Buckbee

Michael Buckbee

GDPR Patterns Preview We’re less than a year out from EU General Data Protection Regulation (GDPR) becoming law, and hearing that our customers are facing more pressure than ever to...

How To Get Started with PowerShell and Active Directory Scripting

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

Working With Windows Local Administrator Accounts, Part I

Michael Buckbee

Michael Buckbee

In writing about hackers and their techniques, the issue of Windows local Administrator accounts often comes up. Prior to Windows 7, the Administrator account was created by default with no...

PowerShell Obfuscation: Stealth Through Confusion, Part I

Michael Buckbee

Michael Buckbee

To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat...

How to use PowerShell Objects and Data Piping

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

GDPR Data Breach Guidelines

Michael Buckbee

Michael Buckbee

Index Personal Data Breach vs. Reportable Breach Notifying the Regulators Breach Notification and Ransomware Individual Reporting Breach Notification in Phases Notification Details This Is Not Legal Advice The General Data...

A Few Thoughts on Data Security Standards

Michael Buckbee

Michael Buckbee

Did you know that the 462-page NIST 800-53 data security standard has 206 controls with over 400 sub-controls1?  By the way, you can gaze upon the convenient XML-formatted version here....

More NSA Goodness: Shadow Brokers Release UNITEDRAKE

Michael Buckbee

Michael Buckbee

Looking for some good data security news after the devastating Equifax breach? You won’t find it in this post, although this proposed federal breach notification law could count as a...

Do Your GDPR Homework and Lower Your Chance of Fines

Michael Buckbee

Michael Buckbee

Advice that was helpful during your school days is also relevant when it comes to complying with the General Data Protection Regulation (GDPR): do your homework because it counts for...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.