0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cryptographic Algorithms Overview
By: Gabriel Schram
April 9, 2021

Cryptography uses security protocols to conceal the true meaning of users’ communications from potential adversaries or malicious actors. This is often done through encryption. Encryption is the process of converting plaintext data into ciphertext. Encryption is vital to the protection of data at rest or in use. This conversion is often directed using an algorithm. Algorithms act as sets of ...

Implementing a HIPAA Compliance Program Course Review
By: Prasanna Peshkar
April 8, 2021

Implementing a HIPAA compliance program is necessary to ensure that the company is loyal to all rules and laws set out in the HIPAA Privacy and Security Rules. A robust HIPAA compliance program is vital to assure that all sensitive documents, particularly medical data, are safe and appropriately secured from security breaches. This Implementing a HIPAA Compliance Program course from ...

Does Ransomware Pose A Threat To The Quantum Computer?
By: Shimon Brathwaite
April 8, 2021

Quantum computing is one of the new technology advancements of the 21st century that has a lot of potential for creative destruction. Quantum computing uses quantum bits rather than regular bits; this allows it to process things much faster than a regular computer. This new technology can have applications in many different areas, and one of them is Cybersecurity. One ...

Top Four Digital Forensics Certifications
By: Nihad Hassan
April 7, 2021

As society moves steadily to become completely digital, cybercriminals moved with the wave and shifted their activities to cyberspace. The ongoing spread of COVID-19 has forced most organizations worldwide to adopt the work-from-home model. In this new scenario, employees have to access their corporate resources remotely using personal computing devices considered less secure than their work counterparts. This created a ...

How To Become A Database Administrator
By: Matt Choi
April 7, 2021

Becoming a Database Administrator is a rewarding but challenging career path that offers many benefits in a growing IT field. Database Administrators manage systems that utilize, protect, query, and provide the secure storage of important organizational data. At Cybrary, students will have access to our virtual lab for hands-on experience. Courses are taught by knowledgeable instructors who are experts in ...

Top Four GRC (Governance Risk Management and Compliance Software) Tools
By: Nihad Hassan
April 6, 2021

As the world moves steadily to adopt digital technologies in all life aspects, the need for various regulations to govern the storage, processing, and transfer of people's data becomes increasingly important. The ongoing spread of coronavirus disease has forced most organizations to adopt the remote work model. In this new working scenario, employees access corporate resources remotely using personal computing ...

Free Network Mapping Software
By: Nihad Hassan
April 6, 2021

As the digital transformation revolution moves steadily to occupy all life aspects, human dependence on technology increases. Technology becomes an integral part of everyday life. We know we are using technology whenever we use a mobile phone, a laptop, a tablet, or other computing devices to work, to study, to socialize, to shop and for entertainment, and online communications. ...

What Is A Vulnerability Assessment?
By: Gabriel Schram
April 5, 2021

An underlying cause of breaches and exploits is improper or lack of vulnerability testing. A vulnerability can be broadly described as a weakness in a system, operational process, or design that a threat can exploit. Testing for vulnerabilities is an important component of proactive cybersecurity and system hardening. A vulnerability assessment is a review and evaluation that tests a ...

Crowdstrike RTR Optimization
By: Owen Dubiel
April 5, 2021

Crowdstrike has taken significant steps in the industry to proclaim itself as one of the top contenders for Endpoint Detection and Response. Many Crowdstrike customers can detect, isolate, contain, troubleshoot, and remediate 90% of incidents within minutes, but many are unaware of exactly how to accomplish this. This article will dive into the full capabilities of Crowdstrike’s RTR (Real-Time Response) ...

Privacy Issues With AI As They Intertwine In Our Lives Deeper Everyday
By: Prasanna Peshkar
April 2, 2021

As more companies are adopting Artificial Intelligence (AI) as a core component of their digital transformation, there is a demand for panels to concentrate on the risks associated with AI's handling of personal data and the possible preference and unpredictability of its output. AI has been in the world of IT for a while; yet, over the past few years, ...