0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Introduction To Token Based Authentication
By: Nihad Hassan
May 7, 2021
As the world moves steadily to become fully digital, human dependence on technology increases rapidly. Nowadays, technology has infiltrated all aspects of our lives; people are using it to socialize, work, and study and shop, to name a few. To distinguish a user among millions of connected users online, authentication was invented to prove someone's digital identity. Digital authentication establishes confidence ...
Crowdstrike Zero Trust Power Partnership
By: Owen Dubiel
May 7, 2021
Zero-Trust is a buzzword that gets thrown around a lot in the security industry. There are a lot of companies claiming to offer an all-in-one solution to handle the topic of Zero-trust. Essentially, instead of "trust but verify," zero-trust is precisely what it sounds like, "trust nothing, authorize first." This article will discuss a partnership between four of the largest, ...
How To Create A Security Incident Response Plan
By: Nihad Hassan
May 7, 2021
The number of cyberattacks is escalating in both number and sophistication. As the world continues to move steadily to become fully digital, people's dependence on digital technology increases rapidly. As a result, criminals are riding the new digital wave and are shifting their operations to cyberspace. Global cybercrime damage is expected to cost the world $10.05 trillion annually by 2025. The ...
Introduction to Data Center Security
By: Nihad Hassan
May 5, 2021
Today's organizations of all sizes and across all industries are on different digital transformation roads. Digitalization has affected our life aspects; the most noticeable change was how enterprises do business and interact with customers. In today's digital age, most data is created digitally and never saved into paper. According to Statista, the total amount of data created, captured, copied, and ...
ITIL 4 Foundations Course Review
By: Prasanna Peshkar
May 5, 2021
Technology controls nearly every phase of today's markets, from an employee's job to services. When accurately managed, technology can be optimized to increase interaction, create facilities, and enhance productivity. Why is IT infrastructure critical? If an IT infrastructure is adaptable, strong, and secure, it can support a business to meet its goals and provide a business with a competing advantage in ...
Cybrary's Free May Cybersecurity Courses Available Through May 31st
By: Garrett Wilson
May 5, 2021
Cybrary's May free courses are now open for enrollments to all users. Cybrary's May free courses are now open for enrollments to all users. We invite you to enroll in these courses that are all recently updated, improved, or newly published on the platform. Here are 6 courses free to everyone through May 31, 2021. Certified Cloud Security Professional (CCSP) Recon 101 ...
Top Three Data Loss Prevention Software
By: Mark Nibert
May 4, 2021
In recent years, data breaches have increased significantly due to the rise in the number of organizations entirely reliant on digital systems to run their business operations. Nowadays, most data is created digitally and not stored on paper. Data is considered the most important asset that organizations need to protect to remain in compliance with the various laws and ...
VPN Protocols Guide
By: Owen Dubiel
May 4, 2021
Using a VPN service when online is one of the most critical professional and personal steps anyone can take to improve their overall security stance. But choosing a VPN service can be easier said than done. Understanding your goals for the service and understanding which protocols are needed to best suit those goals is essential. The last thing anyone wants ...
How the Popular ML models work
By: Divya Bora
May 4, 2021
“Machine Learning is focused on computers learning and acting like a human, and improve learning with time autonomously by feeding data and information in the form of observations and real-world interactions.” Machine Learning (ML) is considered an application of Artificial Intelligence (AI) that enables systems to automatically learn and improve without being explicitly programmed. An algorithm is a sequence of statistical ...
What Is Hybrid Cloud?
By: Nihad Hassan
May 3, 2021
The digital transformation is moving steadily to occupy all aspects of life. People become dependent on technology to work, study, socialize, entertainment, online banking, or for shopping, to name only a few. This rapid acceleration of technology has shifted the world into what is now known as the information age. Nowadays, organizations of all types and across all industries ...