0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


If you’re one of the few who haven’t yet tried out container orchestration, you might be new to the Kubernetes architecture . “Kubernetes is a portable, extensible open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation.” Kubernetes, also popularly ...


The DevOps methodology empowers development and operations teams to collaborate rather than conflict with each other. Some of the benefits realized from a DevOps approach include more frequent software releases, shorter time to market, and fewer application failures in production.Despite these benefits, the focus on rapid development and compressed development cycles in DevOps acts as a barrier to ...


Open Source Software (OSS) components are essential for most applications today, often making up more than 50% of the codebase. Many organizations struggle to implement the appropriate security measures to protect against open source vulnerabilities. Once a vulnerability is fixed, another one pops up, and open source security can often seem like a losing game.This article explains the dangers ...


This post originally appeared on "The Lockdown" , Thycotics Cyber Security Publication The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these ...


Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on.It’s no wonder that email-hosting services like Office 365 have become so popular. Such cloud-based email services remove a lot of the ...


onethird] [/onethird Fun Facts About Gabrielle! What course do you teach? Introduction to SIEM Tools What is an interesting fact about you? I’m 6’0” and the shortest in my family! Your favorite food? Sushi, ...


Defense in Depth is something everyone in security talks about. It is one of the first things a security professional will know and understand when they start down their journey to the dark side. Which, cyber security is the dark side of Information Technology. We are the professionals that say no to all the kids running around. Most ...


While phishing has been around for a long time it still is something that each and every one of us experience in some way. To further this, its not going away either, only increasing as tools and skills get more and more advanced. To start I will share common tactics used in phishing emails, and then share ...


The day has come – hackers’ have taken over every single password on the planet. For many, you may find yourself facing the end of the world as you know it. But before you panic, we have the essentials ready for you and your organization to survive. Your defense starts here. Get your password survival kit & free ...


Google has been a powerful tool in the cybersecurity industry for a long time. Specialized searches can be used to gather information that is publicly available, but searches can also be used to compromise security systems. Many technologies, including web hosting, ...