Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 8, 2019
By: reliableacorn
497

How Do I Get into Android Development?
Android applications are everywhere; recent data shows more than 2.4 million apps1 on the Google Play store, and companies worldwide are now adopting Android development strategies to help bolster their brands and deliver mobile-first experiences to consumers. As a result, skilled developers are in demand across both startup first and established enterprises. From coding and testing to design and security, there are massive market opportunities for trained Android developers ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 6, 2019
978

By: reliableacorn
Efficiency matters. As IT projects and deployments become more complex, organizations need strategies to limit overspend and improve ROI – 76 percent of CIOs1 surveyed say that complexity already makes it “impossible” to manage performance. Begin FREE Lean Six Sigma Yellow Belt Course >> And while IT professionals are naturally incline ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 2, 2019
2826

By: jasminen
This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. W ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 22, 2019
By:
5819

How Researchers Are Fighting Back Against Ransomware
For too long, cybercriminals have been raking in billions of dollars from businesses around the globe through the use of crypto-ransomware. This is a specific type of ransomware that uses encryption technology to ‘scramble’ the data of its victims. The victim is then instructed to pay a ransom, by a specific deadline, to have their data decrypted. The threat is increasing. Global losses have risen from $5 billion in 2017 to an anticipated $11.5 billion by the time 2019 i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 21, 2019
By: SLWelty
6072

Get on Thycotic’s nice list for 12 days of Privileged Access Management Giveaways
This blog was posted by Thycotic Security. It’s time to make sure you’re on your best behavior because Thycotic is coming to town! We’re kicking off our annual 12 Days of Thycotic contest and we want to make sure you’re on the list to receive 12 days of gifts and resources. This year, from Tuesday, December 3rd to Wednesday, December 18th, we’ll be sending out free goodies just for you. Every day, for 12 days, you’ll have a new InfoSec gift to unwrap, designed to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 19, 2019
5548

By:
If you lost SQL database Password and want to know “how to recover SQL database password”? Then this article will provide all the possible ways for recovering the SQL server database user password. Microsoft has created SQL Server Management Studio (SQL Server), which is a Relational Database Management System (RDBMS). It is used to store ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 16, 2019
5361

By: Solene Gabellec
This blog is by Knogin blog by author Anthony Carballo. Reposted with permission. It was found in Android OS versions 8.0 & higher that the security warning message to install external apps does not prompt users when an app is transferred via NFC (Near Field Communication). This can give nefarious actor leverage to send and install a PUA ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 15, 2019
By: jasminen
2154

Meet Your Instructor: Jeff Brown
    Fun Facts About Jeff! What course do you teach? AZ-300: Microsoft Azure Architect Technologies What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open water Diver license. Your favorite food? Before getting into the IT industry, I was a music major in college but decided that it was not ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel