0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Are The Best Cybersecurity Certifications

By: Garrett Wilson
October 23, 2020
What are the Best Cybersecurity Certifications? Cybersecurity is a hot topic. Increasing attack pressure combined with a growing skills gap puts many companies in a difficult position as they look to find best-fit candidates with the right set of hard and soft skills — and the talent and drive to solve infosec problems combined with recognizable, reputable cybersecurity certifications. But which ...
Cyberspace is a dangerous place. Behind all those ‘helpful’ websites which promise to provide the users with ‘free’ stuff, there are internet-predators who are either after an unsuspecting target’s PII (Personally Identifiable Information) or after the computer resources they possess. Security experts agree that the random link an unsuspecting person got from a stranger on an internet forum will provide ...

The Best Certifications for CyberSecurity Jobs

By: Garrett Wilson
October 21, 2020
Breaking it Down: The Best Certifications for Cybersecurity Jobs You’re looking for a cybersecurity job. You’re in luck — information security professionals are now in high demand as companies move to shore up existing security controls, build better infrastructure, and develop policies and procedures that help future-proof key systems against attack. To help meet their cybersecurity goals, organizations are seeking the ...

New Course "COBIT Foundations" Summary

By: Adhirath Kapoor
October 21, 2020
Information Technology is essential to every industry that exists in today's era. In itself, IT is a vast domain that needs to be incorporated with the associated industry in a very diligent manner. An important term that comes into play after successful incorporation is "IT Governance." It makes sure that the IT Departments are ready for any challenges thrown ...

"Cyber Network Security" Course Overview

By: Luis Carrillo
October 20, 2020
Data could be considered the most valuable asset both in our personal lives and in business. For this reason, data is highly susceptible to security attacks. The more data you store online, the more you and your business are at risk – almost no one is safe from cybersecurity threats. A hacker attack occurs every 39 seconds, affecting one in three ...

Is IoT Easy to Learn?

By: Michael Cunningham
October 20, 2020
The short, concise, and straightforward answer is "Yes" if one starts with the basics and builds a solid foundation. You are not trying to make a rocket to go to the moon. Now let us get into the fuller story. One of the first considerations is the extent of one's knowledge base. Are you a hobbyist radio repair tech? What ...

Cybersecurity Of The Internet Of Drones

By: Muhammad Bilal
October 19, 2020
There is a modern trend edging towards development in Unmanned Aerial Vehicles (UAVs). UAVs have supported various opportunities and opened paths at an effective cost in the development of technology. UAVs can be considered one of the best solutions in many surveillance areas, such as research, medical, agricultural, and transportation, due to the capability of dynamic reconfigurability, fast response, and ...
Of all the executive positions in the enterprise, few have evolved as quickly as the role of the CISO. Traditionally, a CISO’s role focused on technical tasks, an approach that was sufficient in the past given the less complex and relatively slow-moving nature of cyberthreats. Today, it is a very different picture, where cyber risk is everywhere, and technology is ...

Course Summary: NIST Privacy Framework

By: S.E. Williams
October 16, 2020
Overview of the NIST Privacy Framework The data-processing ecosystem of business environments is often highly complex and dynamic, with ever-changing interconnected relationships (Green, 2020). In such environments, every role, depending on its responsibilities, may use privacy-related data for varying outcomes. Implementing the NIST Privacy Framework gives an organization a method to better manage all its systems, controls, and ...

Is It Easy To Tweet As Anyone?

By: Vedant Jain
October 16, 2020
On the 15th of July, 2020, Twitter was Hacked. High profile accounts on Twitter posted a tweet to ask their followers to send Bitcoin. Twitter said it was a social engineering attack, while the media and others claimed it was an insider attack. No matter what the real cause was, human factors were involved. __This brings up an interesting and ...