0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ransomware Prevention Strategies
By: Gabriel Schram
April 27, 2021

Identifying the tactics, techniques, and procedures of modern ransomware attacks is pivotal in securing cyber defense architecture. Recent years have exposed new and more successful variants for this specific type of malware. Ransomware is a type of malware that encrypts the entirety of the target system and demands a paid ransom to restore its data. Figure 1 displays an example ...

Types of Artificial Intelligence
By: Divya Bora
April 27, 2021

Artificial Intelligence (AI) is an extensive branch of computer science that involves building smart machines capable of performing tasks that require human intelligence. AI enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. It is an intelligent entity which humans create to make machines capable of thinking and acting humanely. Few programmable functions ...

Why You Should Learn Linux For Cybersecurity
By: Shimon Brathwaite
April 26, 2021

Linux is an operating system many people outside of security/IT have no experience with. For the most part, people either use windows and mac as their operating system, but this is not all that's out there. Linux, which shares several similarities with the Mac OS, is an operating system commonly used in corporate environments. If you plan to work in ...

Evimetry: Interview with Dr. Bradley Schatz Course Review
By: Hugh Shepherd
April 26, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, conducts an interesting and informative interview with Dr. Bradley Schatz. Dr. Schatz is the Advanced Forensics File Format (AFF4) co-author and creator of the forensics workflow toolkit, Evimetry. The format of this course is a five-part interview with Dr. Schatz. During the interview, Dr. Schatz answers a ...

Best Free Security Software to Use In 2021
By: Nihad Hassan
April 26, 2021

In today's digital age, people are utilizing technology in all aspects of life. In work, study, socializing, entertainment, in addition to online banking and shopping, technology has become an integral part of our life. The rapid advancement of the internet and communication technologies means most people utilize at least one computing device. For example, according to Statista, the number ...

Introduction to Data Exfiltration
By: Nihad Hassan
April 23, 2021

Digital transformation is rushing to occupy all life aspects. In today's digital age, organizations of all types and across all industries utilize digital solutions to facilitate work operations. Nowadays, most information is created digitally and never finds its way into papers. According to Statista, total data created, captured, copied, and consumed worldwide is forecast to increase rapidly and already reached ...

The Evolution Of AI In The Field Of Data Privacy
By: Prasanna Peshkar
April 23, 2021

Privacy issues lie at the forefront of the online world, business operations, and government rulings. These issues are caused mainly by breaches, fake news, and personal data exposures that have disintegrated trust in technology and information technology. Privacy is a vital element of cybersecurity, and it is necessary to recover the trust people place in information technology. The fundamental meaning of ...

Why The CEH Certification Is Good For Ethical Hacking?
By: Shimon Brathwaite
April 23, 2021

Being a computer hacker has become one of the most profitable ways to make money online in the 21st century. There is a new cyberattack approximately every 39 seconds. The fact that it can be done from any part of the world against someone on the other side of the world is something we have never seen before. Fortunately, people ...

Cybersecurity Audit Tips And Tricks
By: Darcy Kempa
April 22, 2021

Occupational tips and tricks are often the results of many years of personal experience. Over an employee’s lifetime, personal successes and failures are analyzed to identify what worked and what did not. They can then use the successful tips or tricks to improve performance, reduce waste, or save time. The following cybersecurity audit tips and tricks are ...

GDPR Compliance Checklist
By: Nihad Hassan
April 22, 2021

The General Data Protection Regulation (GDPR) is considered the most important data protection regulation globally. It was issued to protect the EU citizens' data when stored or processed across the world. GDPR became enforceable in May 2018; since then, it has become the main legal framework that any global organization must be subject to when handling citizens' data in ...