0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


With the prevalence of virtualization and cloud computing making major bounds in recent years, the old ways of forensic data acquisition are fading into oblivion. Not only are the storage device capacities increasing by orders of magnitude, but they are also often inaccessible within a data center halfway around the world. Simply removing the drive to connect a write-blocker, or ...


Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather. Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s responsibility—including the ...


Cybersecurity is a serious buzz word these days, and jobs in cybersecurity are in high demand. It might seem like a highly specialized skill set, but I’m going to let you in on a little secret. Anyone can learn cybersecurity! You don’t need an IT background to jump in and start learning about cybersecurity; anyone, regardless of their background, can ...


Ethical hackers are in big demand. Recent data from the the EC Council 1 indicates this role is the number one role in demand and growing, with enterprises paying on average $90,000 salary, up to $140,000 annually to secure the services of a skilled ethical hacker. Despite the positive impact of white hat hackers in identifying and remediating cybersecurity issues, ...


The Equifax data breach of the summer of 2017 was one of the most impactful in recent history as it exposed sensitive data for as many as 143 million US consumers. It’s recently making the news yet again as the Justice Department just charged 4 Chinese military hackers for the breach. The full story of how this ...


One popular misconception in cybersecurity is what an advanced persistent threat (APT) is. An APT is a type of attack and not a threat actor (Lord, 2018). This attack is classified when an unauthorized user exploits a system and remains in that system undetected for a extensive period of time. APT threat actors do generally do not want to damage ...


Enjoyed reading this Threat of the Month? Subscribe to the Threat of the Month blog series and get alerted when new blogs are published. This blog was originally posted on the Cisco Security Blog by author Ben Nahorney. Reposted with permission. It’s hard to ignore the ...


Technology professionals are in demand as companies look to manage increasing IT complexity, optimize tech performance and deliver consistent ROI. For organizations, this presents a challenge as the need for skilled personnel outstrips available supply. But as noted by Information Week , there’s an industry shift underway as enterprises pivot toward “certified and soft skill-rich” candidates ...


Today’s information technology and cybersecurity industries are exploding with job openings. In fact, there are more available positions in these fields than there are qualified professionals to fill them. There is no better time to begin a cybersecurity career than right now. Whether you are just out of college, or you are transitioning from another IT role, getting started in ...


Demand for skilled IT professionals is exploding — companies can’t find enough skilled, entry-level staff and the problem is getting worse. Adoption of “new collar” approaches that prioritize skillsets and industry certifications over traditional post-secondary programming are beginning to bridge the gap, but the increasing scale and scope of technology presents a new challenge: Finding intermediate IT pros with the ...