0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Security Teams Quick Guide to working Remotely and Securely-large (1) As employees are packing up their office equipment and shifting to working remotely, they are facing serious risks and exposure to cybercriminals wanting to take advantage of these increased opportunities. A well-executed transition will make working from home possible and maintain security, and it will do so within the limitations ...

A CISO's Guide to WFH Security

By: Mike Gruen, CISO at Cybrary
March 18, 2020
As more and more companies are planning, and now executing, their emergency remote workforce strategies, we see an influx of articles with helpful WFH tips to stay productive. Here today, we are filling in some gaps other articles seemed to overlook. This short list of Dos and Don'ts geared for IT and Security teams will provide some helpful insights; however, ...
With the prevalence of virtualization and cloud computing making major bounds in recent years, the old ways of forensic data acquisition are fading into oblivion. Not only are the storage device capacities increasing by orders of magnitude, but they are also often inaccessible within a data center halfway around the world. Simply removing the drive to connect a write-blocker, or ...
Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather. Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s responsibility—including the ...

Can A Non-IT Person Learn Cybersecurity?

By: Jenna Crawford
March 2, 2020
Cybersecurity is a serious buzz word these days, and jobs in cybersecurity are in high demand. It might seem like a highly specialized skill set, but I’m going to let you in on a little secret. Anyone can learn cybersecurity! You don’t need an IT background to jump in and start learning about cybersecurity; anyone, regardless of their background, can ...
Ethical hackers are in big demand. Recent data from the the EC Council 1 indicates this role is the number one role in demand and growing, with enterprises paying on average $90,000 salary, up to $140,000 annually to secure the services of a skilled ethical hacker. Despite the positive impact of white hat hackers in identifying and remediating cybersecurity issues, ...
next.techlab Announcing the New Partnership We are excited to announce a brand new partnership between Next Tech and Cybrary! Keeping pace with the speed of the change in the cybersecurity industry can be one of the toughest challenges for a professional. After speaking with thousands of CISOs and security managers from leading organizations, we are finding a greater need for cybersecurity professionals ...

Learn how Chinese hackers compromised Equifax

By: Adversary
February 18, 2020
The Equifax data breach of the summer of 2017 was one of the most impactful in recent history as it exposed sensitive data for as many as 143 million US consumers. It’s recently making the news yet again as the Justice Department just charged 4 Chinese military hackers for the breach. The full story of how this hack took place ...
One popular misconception in cybersecurity is what an advanced persistent threat (APT) is. An APT is a type of attack and not a threat actor (Lord, 2018). This attack is classified when an unauthorized user exploits a system and remains in that system undetected for a extensive period of time. APT threat actors do generally do not want to damage ...

Securing Industrial IoT

By: lpark
February 11, 2020
Enjoyed reading this Threat of the Month? Subscribe to the Threat of the Month blog series and get alerted when new blogs are published. This blog was originally posted on the Cisco Security Blog by author Ben Nahorney. Reposted with permission. It’s hard to ignore the ...