0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Navigating a Security Wasteland: Cloud Security
By: kathiemiley1
August 8, 2018

Vol.3 Navigating a Security Wasteland: Cloud Security Cybersecurity has grown into a never-ending war between cyber thieves and their victims. These cyber thieves exploit network and user vulnerabilities to steal valuable information or cripple organizations for gain. Their victims, mainly businesses and organizations, fight against them to subdue and recover from attacks to protect their assets and livelihood. ...

10 Steps for Building a Strong Cyber Security Culture at Work
By: veronica90
August 8, 2018

Cybersecurity is something modern companies have to take seriously. It’s also more than just the stuff the IT department does behind closed doors – it all starts with creating the right cybersecurity culture and adopting the right software for small business.  To build a brand in the market, perfect cost-effective marketing strategies will need with internal security ...

Zero to Employed in 3 Months - Success Series
By: Tatianna
August 7, 2018

This success story takes you on Gabrielle's Cybrary Insider Pro's journey. She had no experience, decided to change industries, and eventually became a Security Analyst at one of the world's most prestigious consulting firms. The Journey: Healthcare. Far outside the realm of the typical background of a cyber security professional. When I first started looking, I quickly ...

Looking Into the Future of 3D Rendering
By: Veselina Dzhingarova
August 7, 2018

Three-dimensional (3D) rendering converts 3D models into 2D representations on the viewer’s screen. It may involve effects to make the 3D model in a 2D format look like a photo, or it may not, depending on the application. For example, when showing off an architectural design, adding details like landscaping is intended to make the customer buy ...

Stopping Scams Against the Layperson
By: sproutx2125
August 6, 2018

My current career provides me with the opportunity to speak with many people who have become victims of scammers. These scammers utilize Internet technology to gain access to a victim's computer and lock it from the victim. These victims are then forced into paying money or sending gift cards to unlock their computers.Many times, the person I am meeting ...

Are You Properly Using Your Hoodie as a Penetration Tester?
By: clarkincnet
August 4, 2018

Rapid7 released a research report last month entitled Under the Hoodie – Lessons from a Season of Penetration Testing .   The report outlines some interesting finds from 268 penetration engagements from the period of September 2017 through June 2018. Maybe it’s just me, but using the word “hoodie” in the name of the report conjures an image of ...

Should You Become a Cyber Security Engineer?
By: ginasilvertree
August 2, 2018

These days, many people are asking themselves whether they should become cyber security engineers. As cyber jobs increase exponentially and thousands of cyber positions remain open, it’s a good time to ask this question. In this post, we’ll explore ...

Best Ways To Attract Customers
By: lisabrooke
August 1, 2018

It is always difficult to figure out ways to attract new customers. After all, you are competing for the same customers as your rivals are. But there are ways you can gain a competitive edge so that you can consistently find and keep new customers, as well as retain those customers who have been with you from ...

A Brief Introduction to Kali Linux for Cybersecurity
By: Dr. Michael J. Garbade
July 31, 2018

What is Kali Linux? Kali Linux, initially released in 2013, is a popular Debian-based Linux distribution operating system mainly used by penetration testers and digital forensics experts. The cyber security tool is maintained and funded by Offensive Security Limited, a prominent IT security company. Kali ...

CASB Benefits in the Digital World in 2018
By: Ugra Narayan Pandey
July 31, 2018

A security gateway is established between an organizational infrastructure and a cloud service provider. The name of this gateway is the cloud access security broker or CASB. Enterprises adopt CASB benefits to expand their policies of IT governance and comply with regulations to third-party storage and applications. There is a need for CASB cloud services if ...