0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Practical SSL/TLS Attacks and Decrypting Web Traffic
By: Chang Tan Lister
March 15, 2019

Introduction: Practical SSL/TLS Attacks and Decrypting Web Traffic  Chang Tanchangtan@listerunlimited.comFor the purposes of this chapter, both the terms SSL (Secure Sockets Layer) and TLS (Transport Layer Security) shall be used interchangably to explain the same thing, that is the end-to-end encryption scheme that secures modern day HTTPS implementations via TLS. A lot of people know the consequences of compromised credentials but fail ...

Cybersecurity Insurance
By: Gunner Kerr
March 15, 2019

What’s the point of cybersecurity insurance? Cybersecurity insurance is crucial to the function of many organizations that rely on digital assets, but it is not widely understood. Unlike other types of insurance, cybersecurity insurance policies must be customized ...

Preparing Against Social Engineering
By: Tatianna
March 13, 2019

Security Awareness is Cybersecurity Social engineering is a cybersecurity approach that affects individuals and organizations both public and private. Bypassing the technical aspect of hacking, social engineering relies on convincing an individual to compromise sensitive data or grant unauthorized ...

PMP Certifications, Are They Worth It?
By: filr
March 11, 2019

What Other Jobs/Industries Use PMPs? Project management professional (PMP) certification is an invaluable asset for many project managers in virtually any field. The Project Management Institute (PMI) is a nonprofit that handles PMP certification and education, and attaining certification ...

Kali Linux Around the World
By: kenunderhill
March 9, 2019

What is Kali Linux? As we explored in previous sections, Kali Linux is an open source operating system based on Debian Linux . The operating system is designed specifically for penetration testing and other cybersecurity tasks, and it ...

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
By: purvikshah
March 8, 2019

Original Author : Steve MartinoToday, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world. With over 3200 respondents across 18 countries, the study offers a solid view of what’s on the minds and to-do lists of those on the front ...

What You Need to Know about Cybersecurity
By: diceus
March 8, 2019

Cybersecurity is a valuable issue nowadays not only for the IT department but for the whole company as well. Because of the significant business risk and security threats customers start worrying about it as well. Media informs that global security incidents have become so widespread as the weather forecast. Cybersecurity  is essential because a military, government, ...

Understanding Data Integrity
By: Ryan Stewart
March 8, 2019

What is data integrity and why is it so important? Data integrity is about protecting your data against manipulation, harmful maintenance practices, or unwanted modifications. It is crucial for applications and services that require accurate, protected data. Integrity, the "I" ...

Reasons to go for Microsoft Azure Career
By: Vikrant Saran
March 8, 2019

To maintain your place in the IT industry, you need to advance and adhere to its technological developments and trends. Realizing the need of the hour, and to inculcate the best way of operations in their organizations, the companies are migrating their computing base to the cloud. Being a professional with a developed outlook, you must know ...

Once again about IP-addresses, subnet masks and in general.
By: Dra4hos7
March 7, 2019

A little literacy.  Inspired by previous copy-paste of various rubbish on this topic.  Forgive the nosing staff.  The IP address (v4) consists of 32-bit.  Any self-respecting administrator, and indeed an IT specialist (I’m silent about network engineers), being awakened in the middle of the night or in a state ...