0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Protect Windows Remote Desktop Connection
By: Nihad Hassan
October 5, 2021

The ongoing spread of the COVID-19 virus has significantly impacted the work culture around the world. Digital transformation witnessed a boost by several years in just a few months. To remain operational during the long period of lockdown, organizations opted to adopt the work-from-home model. To gain access to remote resources, employees have to use specialized software to connect with ...

What Is DevSecOps, and Why Is It Important To Your Business?
By: Cybrary Staff
October 4, 2021

The rapid adoption of digital technologies has changed business rules, necessitating a security-first application development and deployment approach. Digital transformation is now well underway across virtually all industries. Still, major challenges remain when it comes to upholding the demands of security, privacy, and compliance during a period of rapid change. While the need for performance and efficiency is as strong as ...

CEH Prerequisites
By: Elviraluke Napwora
October 4, 2021

Certified Ethical Hacker (CEH) is a globally recognized professional security certification for Ethical Hackers administered by EC-Council. The CEH certificate holder has proven that they are proficient in identifying weaknesses in computer networks and systems and addressing those vulnerabilities. This could entail utilizing hacking tools and techniques to pre-empt actual attacks and how to defend and protect against them to ...

What Is Operational Technology, and Why Is It Important In Today’s Computing Environments
By: Cybrary Staff
October 1, 2021

What is operational technology, and why is it important? In today’s dynamic IT environments, operational technology plays a central role in monitoring, securing, and controlling business-critical processes. In today’s hyperconnected world, it has become impossible for information technology to exist in a bubble. Defined perimeters and connections between systems are protected and monitored to uphold the highest possible integrity, security, ...

Top Four eCommerce Security Threats For 2021
By: Nihad Hassan
October 1, 2021

The Digital revolution impacts everything around us; nowadays, people use the Internet heavily in their daily lives. For instance, they use it to study, work, socialize, conduct online banking, and shop from the online marketplace. The ongoing spread of COVID-19 has changed customer buying behaviors dramatically; people have become more willing to shop from home, especially after the extended lockdown ...

Is The CEH Worth It?
By: Hugh Shepherd
September 30, 2021

Spending the time and money to earn certification is a commitment. Asking yourself, "Is this worth it?" is an understandable question and makes perfect sense. Certification exams can be expensive and require time to study, so you want to make sure investments of time and money will pay "dividends" in a career boost. Before pursuing a certification, candidates need to ...

Top Hacking Tools For Cybersecurity
By: Shimon Brathwaite
September 29, 2021

Cybersecurity professionals need to know many different things. For ethical hacking, several industry-standard tools have proven to be most effective. Especially as a beginner, when one’s programming skills aren’t highly developed, it helps to rely on pre-made software tools to find vulnerabilities and perform security assessments. Here I’ve provided a list of the top hacking tools one should learn to ...

What Is Application Security, and How Can You Implement It In Your Business
By: Shelby Welty
September 29, 2021

What is application security, and how can business leaders implement it? With opportunistic attackers constantly looking for software vulnerabilities, prioritizing application security has never been more important. According to the State of Software Security report by Veracode, three-quarters of apps have at least one security flaw, a quarter of which are considered severe. Furthermore, many apps had multiple security flaws, and given ...

What Is Secure Coding, And Why Does It Matter?
By: Cybrary Staff
September 28, 2021

With software vulnerabilities being a top target for hackers, it is more important than ever to start thinking about security when coding new software. While today’s security leaders are well aware of the need to keep their software updated, in many cases, the root of the issue lies with software development itself (Almost two-thirds of data breaches in 2019 [involved unpatched ...

How To Secure IoT Systems
By:
September 28, 2021

The proliferation of internet-connected systems other than computers and mobile devices has dramatically expanded attack surfaces, hence the need for IoT security. To suggest that cybersecurity used to be easy might seem hard to believe for new ones. In the old days, security largely revolved around antivirus software installed on endpoints, network firewalls, and locked doors. It was defined by the ...