0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Smartphones, smartwatches, smart TVs, smart refrigerators, Alexa, Bixby, Cirri, are all part of the Internet of Things. Each of these has one thing in common, and they are all connected to the World Wide Web using WIFI or Bluetooth. There are hundreds of other objects that are "smart." The wonderful world of the Internet of Things. All to make our ...


What should a cyber security incident report contain? In the next issue I will refer to a subject, which is becoming a real problem in companies today. I would like to go deeper into the minimum elements that a cybersecurity incident report should contain, which can be shared with the directory, technical teams, suppliers, partners, auditors and even the community. First we ...


DevOps is a set of practices or processes that combines software development and information technology operations. It is becoming popular because it enables businesses to achieve mainly two objectives; decrease systems development life cycle time and provide continuous product delivery with high quality. Increasing the pace of software delivery is not possible with traditional software development methodology as the methods ...


Who is Toll and what happened? On the 31st of January 2020, Toll, an Australian based, internationally operating shipping and logistics company was the subject of a targeted ransomware attack. In response, the company shut down as many as one thousand infected servers, which effectively crippled its IT infrastructure and brought logistics operations to all but a standstill. The company ...


What is Emotional Intelligence? Emotional intelligence is the ability to recognize and identify your own emotions, understanding the feelings of others, and using your ability to manage emotions to work within both realms. One of the critical aspects of being a leader, mentor, or even a teammate is the ability to understand others. As a leader, it means understanding how ...


Ethical Leadership, where to begin? As a leader, or someone looking to be a leader, you are probably thinking to yourself, how do I build and maintain a strong ethical foundation in my job and continue down an ethical path that is effective and trusted both inside and outside of my professional and personal life. In ...


As a student like most of you, I have just joined my first job as a penetration tester. Today, we will discuss the stepping stones to obtain a profession in cybersecurity. Most of the suggestions I will provide are based on what I and my fellow mates have experienced. What is better for a fresh beginner to learn from the ...


It’s no exaggeration to say that cloud computing has fundamentally changed the IT landscape. Once a technology outlier, this distributed deployment model is now critical for companies to drive agility and adaptability at scale. Investment reflects growing this interest: As noted by Tech Crunch, revenue from the cloud infrastructure market alone passed $30 billion in the fourth quarter of 2019,and ...


Cyber Security Teams Quick Guide to working Remotely and Securely-large (1) As employees are packing up their office equipment and shifting to working remotely, they are facing serious risks and exposure to cybercriminals wanting to take advantage of these increased opportunities. A well-executed transition will make working from home possible and maintain security, and it will do so within the limitations ...


As more and more companies are planning, and now executing, their emergency remote workforce strategies, we see an influx of articles with helpful WFH tips to stay productive. Here today, we are filling in some gaps other articles seemed to overlook. This short list of Dos and Don'ts geared for IT and Security teams will provide some helpful insights; however, ...