0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top 7 IT Audit Findings for 2018
By: TONY
January 2, 2019

Human factor remains one of the weakest links in maintaining proper cyber-hygiene in an enterprise. Unfortunately addressing risks posed by humans via training and retraining is often sacrificed on the altar of acquiring fancy security tools… don’t get me wrong, there is nothing wrong with acquiring security tools excepting that they cannot by themselves atone for the information ...

All about 5G - Chipsets, Smartphones, and more
By: Priyank Gada
January 1, 2019

Introduction So in the previous few articles, we have been talking about 5G and we know a lot about 5G. We have also talked a lot about communication standards and their evolution, we know a lot about 5G – 5G NR and now let’s check if our current devices are 5G supported and can you enjoy 5G on ...

Resumes and Cover Letters: 7 Tips for Building Strong Resumes and Cover Letters
By: ginasilvertree
December 31, 2018

Writing strong resumes and cover letters may not be as hard as you think. With a plethora of free templates and tools out in the world, there’s no need to start from ground zero. Choose simple templates (see more on keeping things simple below) from a trusted site and start working on your resume and cover letters today. And ...

Common Sense Security Strategies
By: ragediver24
December 30, 2018

Common Sense Security Strategies in the Digital World You've been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you're on a vacation ...

Networking Part 7: Antenna Types, MIMO, Wireless Standards, Technologies & Compatibility
By: Iselin
December 30, 2018

­Networking Part 7 Antenna Types, MIMO, Wireless Standards & Technologies, Compatibility Antenna Types Transmitting radio waves through electric components An antenna is an electrical component made for sending and receiving radio signals. They convert electronic signals into electromagnetic waves and vice versa. Sometimes ...

The rise of SamSam ransomware
By: richardb8006
December 29, 2018

The rise of SamSam ransomware This weekend the SamSam ransomware made the Dutch news. Why? Because SamSam is on the rise in our country. According to the article and source Fox-IT , small to medium  businesses are targets. The report of Sophos, a result of a thorough investigation, reveals that the cybercriminal or cybercriminals behind ...

Intrusion Detection System Vs. Intrusion Prevention System
By: mohan1994
December 29, 2018

Intrusion Detection System (IDS)  is a computer security system that monitors network traffics for malicious activities and alert the network administrator when malicious activities detected. IDS performs a passive monitoring and implement in passive/promiscuous mode. IDS can detect the malicious activities but cannot prevent it. IDS have these capabilities include: Monitoring about malicious ...

Introduction to AI for Cyber Security Professionals
By: Dr. Michael J. Garbade
December 28, 2018

Improving threat prevention and detection is a strategic aspect of securing infrastructure against cyber attacks. Despite the availability of various resources that enhance cybersecurity, the tedious process that has previously relied on human involvement is like finding a needle in a haystack. Thanks to artificial intelligence (AI) technologies, significant breakthroughs have been made; and when leveraged, they allow ...

Agile IT Security – What does your IT Security Roadmap look like?
By: jdthbear
December 28, 2018

Us Agile enthusiasts don’t like big projects. Instead, we like to split a big objective or goal into Epics and Features. If you are managing things well eventually you will end up with a product Roadmap. A Roadmap tells you broadly what features will be delivered and when. For a long time now, Scrum Masters and Product Owners ...

IT in the C-Suite, Part 2: Becoming a CISO
By: Tatianna
December 27, 2018

C-suites are making room for chief information security officers. This security-focused executive position is gaining ground as enterprises look for ways to safeguard networks and services without compromising their bottom line. As noted by CBR , the role is evolving to include more responsibility and greater expectations, even as public and stakeholder focus puts CISOs in ...