0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

SAST vs DAST: A VS of the Security Tests
By: Staford Titus S
May 10, 2021
Prelude A crannied, "White Christmas" record crackling through the howling blizzard outside, a rundown fireplace proliferating its warmth, and a cup of hot chocolate topped with toasted marshmallows would be a perfect Christmas eve. Similar shades of bliss were evident at FireEye, where everything seemed fine and dandy until it wasn't. One seemingly benign alarm threw them on a wild ...
Cloud And Container Security With Orca
By: Owen Dubiel
May 10, 2021
Orca security offers one of the first agentless vulnerability scanners for both cloud and container assets. It has a unique ability to identify and classify different cloud threats in a digestible and actionable manner. This article will cover some of the high-level features that allow it to take action within your cloud environment quickly. Alerts Orca has three levels of ...
Bits and Bytes — The Benefits of Just-in-Time Cybersecurity Training
By: Cami Ragano
May 8, 2021
Time is not on the side of cybersecurity teams. As noted by CSO Online, 63% of companies said their data “was potentially compromised within the last 12 months due to a hardware- or silicon-level security breach,” and recent predictions suggest that in 2021, ransomware frequency will ramp up with a new attack happening every 11 seconds. As a result, it is ...
Introduction To Token Based Authentication
By: Nihad Hassan
May 7, 2021
As the world moves steadily to become fully digital, human dependence on technology increases rapidly. Nowadays, technology has infiltrated all aspects of our lives; people are using it to socialize, work, and study and shop, to name a few. To distinguish a user among millions of connected users online, authentication was invented to prove someone's digital identity. Digital authentication establishes confidence ...
Crowdstrike Zero Trust Power Partnership
By: Owen Dubiel
May 7, 2021
Zero-Trust is a buzzword that gets thrown around a lot in the security industry. There are a lot of companies claiming to offer an all-in-one solution to handle the topic of Zero-trust. Essentially, instead of "trust but verify," zero-trust is precisely what it sounds like, "trust nothing, authorize first." This article will discuss a partnership between four of the largest, ...
How To Create A Security Incident Response Plan
By: Nihad Hassan
May 7, 2021
The number of cyberattacks is escalating in both number and sophistication. As the world continues to move steadily to become fully digital, people's dependence on digital technology increases rapidly. As a result, criminals are riding the new digital wave and are shifting their operations to cyberspace. Global cybercrime damage is expected to cost the world $10.05 trillion annually by 2025. The ...
Introduction to Data Center Security
By: Nihad Hassan
May 5, 2021
Today's organizations of all sizes and across all industries are on different digital transformation roads. Digitalization has affected our life aspects; the most noticeable change was how enterprises do business and interact with customers. In today's digital age, most data is created digitally and never saved into paper. According to Statista, the total amount of data created, captured, copied, and ...
ITIL 4 Foundations Course Review
By: Prasanna Peshkar
May 5, 2021
Technology controls nearly every phase of today's markets, from an employee's job to services. When accurately managed, technology can be optimized to increase interaction, create facilities, and enhance productivity. Why is IT infrastructure critical? If an IT infrastructure is adaptable, strong, and secure, it can support a business to meet its goals and provide a business with a competing advantage in ...
Cybrary's Free May Cybersecurity Courses Available Through May 31st
By: Garrett Wilson
May 5, 2021
Cybrary's May free courses are now open for enrollments to all users. Cybrary's May free courses are now open for enrollments to all users. We invite you to enroll in these courses that are all recently updated, improved, or newly published on the platform. Here are 6 courses free to everyone through May 31, 2021. Certified Cloud Security Professional (CCSP) Recon 101 ...
Top Three Data Loss Prevention Software
By: Nihad Hassan
May 4, 2021
In recent years, data breaches have increased significantly due to the rise in the number of organizations entirely reliant on digital systems to run their business operations. Nowadays, most data is created digitally and not stored on paper. Data is considered the most important asset that organizations need to protect to remain in compliance with the various laws and ...