0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



As digital transformation continues to accelerate rapidly, more companies are shifting their data and work operations digitally. The rapid adoption of digital solutions has increased the number and sophistication of cyberattacks. Criminals have ridden the wave and shifted their criminal activities from the real world into cyberspace. According to Cybersecurity Ventures, the global cybercrime damage will reach $6 trillion US dollars ...


Cybersecurity Awareness Month: Building a comprehensive security training program With cybersecurity skills in short supply, investing in employees with comprehensive training and certification preparation has never been more crucial. Summary: With October being Cybersecurity Awareness Month, now is the perfect time for organizations to consider investing in their employees to improve their in-house cybersecurity capabilities. This guide looks at what it takes ...


Just like all living things need water to survive, all companies need cybersecurity to survive. As businesses and jurisdictions are more vulnerable to cyber-attacks, the news publishes information about organizations getting hacked daily. As a result, there is an increasing need for qualified people in cybersecurity to protect against this rising threat. Cybersecurity is a fast-moving, hands-on world with an ...


Take a look at IT security certifications that involve ethical hacking. You will likely notice that CompTIA’s PenTest+ and the EC-Council’s Certified Ethical Hacker (CEH) certifications are similar to each other. That can make it difficult to decide which one is the best option for you and your chosen career path. The obvious solution is to attain both, as nearly ...


Whenever you interact with a website that retains information such as username and password, pictures, accounts information, etc., it gives you the ability to search for this information. This means it’s keeping that information in a database. A database language is the backend programming language that enables you to search for things by name and have that information presented to ...


Digital transformation is accelerating rapidly, affecting all areas of business; nowadays, organizations of all sizes and across all industries utilize information technology to facilitate work operations and increase efficiency. The most obvious aspect of this massive shift to adopting digital technologies appears in the enormous amount of digital data in today's digital ecosystem. According to IDC, by 2025, worldwide data will ...


Overview of the CEH Certification The Certified Ethical Hacker (CEH) certification by the EC-Council is a well-known and longstanding credential for penetration testing. The certification demonstrates the holder’s ability to assess a computer system’s level of security by knowing how to exploit its weaknesses and vulnerabilities. First introduced in 2003 by the International Council of Electronic Commerce Consultants (EC-Council), the CEH ...


Cybersecurity Awareness Month: The role of cybersecurity in today's digital world Cybersecurity is of vital importance in today's hyperconnected world, where threats come from a wide range of sources, such as organized crime and nation-states. Summary: With October being Cybersecurity Awareness Month, now is the perfect time for organizations and their employees to familiarize themselves with the vital importance of digital security ...


Anyone responsible for building and maintaining software on their enterprises should have a vested interest in making their solutions secure. According to a study by Verizon, 27% of all data breaches result from unpatched software vulnerabilities. While a failure to correctly manage and apply critical security updates may be partially to blame, the problem's root cause is usually the software itself. The ...


Four reasons to learn ethical hacking Ethical hackers play a central role in proactive cybersecurity by informing organizations how well (or poorly) their network is defended. Summary: Ethical hackers play an essential role in proactive security by using similar tactics and tools to those deployed by malicious actors, albeit with the organization's permission. This approach reveals potential vulnerabilities that may otherwise ...