0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Build a Red Team
By: Bryan Peace
May 8, 2023

Your team is well staffed and knowledgeable in its defensive security posture, but it still seems like you’re constantly under attack. You trust your team’s instincts, but they’re spending so much time reviewing alerts, triaging, and responding to incidents that they’re often a step behind adversaries. You find yourself wondering how your organization could be more strategic and proactive to ...

Digital Forensics and Incident Response: What It Is, When You Need It, and How to Implement It
By: Bryan Peace
May 5, 2023

It finally happened. You’ve sensed your organization was at risk of a breach, but leadership wasn’t prepared to invest in the tools and develop the skills needed to properly defend your systems and assets. Now you’re on your heels, trying to contain the damage. What next? Consider taking a quick deep dive into the critical cybersecurity domain of Digital Forensics ...

Rapid Response Patch Release From Apple Tackles Critical Issues in an Effort to Close Timeline Gap for Serious Vulnerabilities
By: Cybrary Threat Intelligence Group (CTIG)
May 2, 2023

In a surprising move on Monday, May 1st, Apple released patches for iOS, iPadOS, and OSX using a new process they are calling Rapid Security Response (RSR). This new delivery method caught many off guard, as Apple had not disclosed any details prior to the release. The new process is aimed at addressing the most severe vulnerabilities and reducing the ...

CTIG IoT Research
By: Cybrary Threat Intelligence Group (CTIG)
April 12, 2023

Overview The IoT Problem To begin a discussion about preventing stalking and surveillance, we must first talk about the Internet of Things (IoT). We begin here because the IoT has permeated modern life in countless ways and will only continue to do so. Devices that we use every day from credit card readers at the farmers market, to the ...

Cybrary Counter-Stalking Initiative
By: Cybrary Threat Intelligence Group (CTIG)
April 12, 2023

How we got here In mid-December 2022, we took notice of an Apple update to AirTags which enabled “precision finding,” meant to give newer iPhones the ability to tell their users that an unknown AirTag was traveling with them, and make it easier to locate. The update was compelling for two reasons. Our first thought was to determine how extensive ...

Breaking Into Cybersecurity: Your Top Questions Answered
By: Madison Vorbrich
March 7, 2023

Overview Cybersecurity is a red-hot field with incredible job prospects, but let's face it: breaking into the industry can be a daunting task, especially if you're new to the game. To help you out, Cybrary hosted a webinar, How to Break Into Cybersecurity, on February 22nd, led by the illustrious Will Carlson, Senior Director of Content. The webinar was packed ...

Cybersecurity Certificate Online Programs
By: Cybrary Staff
March 3, 2023

So, you want to learn about cybersecurity. Maybe we’re biased, but we think this is a great idea! Not just because cybersecurity education is our chosen field, either–the cybersecurity job market is very healthy right now, and it’s still growing. With some 700,000+ job listings available right now, getting into cybersecurity could be a very good career move. And the ...

Army Cybersecurity Awareness Training: What You Need
By: Cybrary Staff
March 3, 2023

If you’ve looked for cybersecurity-related jobs online, perhaps the numbers “8570” and “8140” seem familiar to you. These are, after all, the numbers of two of the most important sets of standards in the field: the numbers of the directives put forth by the Department of Defense to establish qualifications for people working on DoD databases at various levels. The U.S. ...

Cybersecurity CEUs: What are They and Why You Need Them
By: Cybrary Staff
March 3, 2023

The field of cybersecurity exists on a frontier in many ways. As a cybersecurity professional, you have to know how to work with the very latest in network technology. In addition, you’re on one side of a constant war–it’s you against cybercriminals, and as those cybercriminals grow and evolve their tactics, you need to stay one step ahead of them. Therefore, ...

The Rise of Performance Based Questions (PBQs) and Cybersecurity Certifications
By: Cybrary Staff
March 3, 2023

What are PBQs (Performance Based Questions)? In a typical exam, questions may include multiple-choice, drag-and-drop, fill-in-the-blank, and other similar formats. This is a time-tested way of verifying the knowledge level of an examinee, and it usually works quite well for most subjects. However, in the case of cybersecurity certification exams, examinees aren’t simply doing it for a grade. Employers want to ...