0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Your Complete Guide to Snort
By: Olivia
July 12, 2017

The 2017 Ponemon Cost of Data Breach Study from IBM recently reported that average data breach costs organizations $3.62 million, approximately $141 per lost or stolen record. Their research indicates that the average size of a breach has increased, 1.8%, the equivalent of 24,000 records per breach.That being said, malicious activity can be very serious for a number of ...

Use Intelligence to Build SOC
By: pankaj1251
July 12, 2017

In the last three years, the proliferation in the growth of active threat actors such as polymorphic attacks and availability of sophisticated hacking tool has rapidly impacted the security posture and expenditure of any size of the organization. The driving factor for adoption of next generation SOC is constantly changing the environment, adapting more cloud-centric approach, and ...

The Best Way To Prepare For A CCNA Certification Exam
By: priyajatoliya
July 11, 2017

The CCNA is regarded as one of the most sought-after certifications in the IT industry for no simple reason. It is required to earn some of the higher level certifications like CCNP. This certification is highly valuable for candidates who are eager to enhance their career with better jobs and higher salary packages. The CCNA certification ...

Making Sense of Certifications: SSCP vs. Security+
By: Olivia
July 11, 2017

In an earlier post, I compared the CSA+ against the CEH, and touched upon a few additional security certs I felt may be of interest. Since then, I’ve gotten the suggestion to compare two other popular security certifications, the Systems Security Certified Practitioner (SSCP)  from ISC 2 and CompTIA’s Security+ .Perhaps both fortunately and unfortunately for ...

Introduction to Network Security: Protocols
By: imarchany
July 11, 2017

Network security has been a top notch in the cybersecurity field due to the interconnected devices across the world. It has become very important in our lives because the Internet continues to evolve and computer networks grow dramatically. The fundamentals of network protocols give you a better understanding how the network is structured and how communications are being ...

A Decentralized Model: The Ultimate Solution for DNS Security?
By: chiheb chebbi
July 10, 2017

DNS Definition: The Domain Name System (DNS) was invented by Paul V. Mockapetris an American computer scientist and Internet pioneer in 1983 with the help of Jon Postel. The aim of DNS is making retaining addresses easier by providing a naming structure using names rather than a long sequence of numbers. Remembering  www.icann.org is much easier than remembering "192.0.32.7". Before ...

The CISO Role: Top Salary for Top Security
By: jrinehard
July 10, 2017

Ransomware attacks and data breaches are everywhere now, and it's only intensifying. With this comes a need for better security, but it seems that security professionals are tougher to attract and keep than ever before. This reason alone may help explain why top-tier salaries are on the rise. Now we’re seeing more recognition for the need to ...

How to Recover and Convert OST to PST
By: lliamaria
July 9, 2017

The OST and PST files are the two bailiwick formats victimized by MS Convert and Outlook for managing all types of emails and attachments files of clients in an administration. Basically, it has seemed that galore of the users are death through the OST Corruption issues in which they had mislaid their all emails as fountainhead as attachments. Nevertheless, ...

Cyber Security Chronicles - Ch 1: Company Security Obstacles
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
July 8, 2017

Chronicle 1: The Cyber Security Chronicles {BY: Jeremy Bannister [The CYBER EAGLE]} Chapter 1 - Solid Foundation: IT Security Obstacles That Could be Building Blocks Do you think IT Security is a vital entity or major goal of focus for organizations when deciding what is an important asset, need, and ...

UNM4SK3D: China, NotPetya, and Bitcoin
By: Olivia
July 7, 2017

#greatfirewall The Great Firewall just got stronger. China's Ministry of Industry and Information Technology recently made it illegal to use or operate VPNs (Virtual Private Networks) without government permission in an effort to increase Internet censorship. Digital dumplings, fried.  Back up. You may or may not know that the 'Great Firewall of China' is "the ...