0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Linux Hardening
By: Corey Holzer, Ph.D. CISSP
October 6, 2021

I cannot count the number of times I’ve heard the phrase, “While adversaries only need to get lucky once, we need to be right every time.” If it were not so accurate, it might become a meme or other running joke. Then again, as Al Capone, played by Robert DeNiro, said in the movie The Untouchables, “As with so many ...

Python Programming For AWS Security Automation
By: Shimon Brathwaite
October 5, 2021

Amazon Web Services (AWS) is one of the most popular cloud service providers for easy to access IT infrastructure. Especially for smaller companies trying to launch a web application, most founders would much rather pay for services like AWS to handle the infrastructure for them rather than having to buy the IT equipment necessary for launching a tech company (e.g., ...

How To Protect Windows Remote Desktop Connection
By: Nihad Hassan
October 5, 2021

The ongoing spread of the COVID-19 virus has significantly impacted the work culture around the world. Digital transformation witnessed a boost by several years in just a few months. To remain operational during the long period of lockdown, organizations opted to adopt the work-from-home model. To gain access to remote resources, employees have to use specialized software to connect with ...

What Is DevSecOps, and Why Is It Important To Your Business?
By: Cybrary Staff
October 4, 2021

The rapid adoption of digital technologies has changed business rules, necessitating a security-first application development and deployment approach. Digital transformation is now well underway across virtually all industries. Still, major challenges remain when it comes to upholding the demands of security, privacy, and compliance during a period of rapid change. While the need for performance and efficiency is as strong as ...

CEH Prerequisites
By: Elviraluke Napwora
October 4, 2021

Certified Ethical Hacker (CEH) is a globally recognized professional security certification for Ethical Hackers administered by EC-Council. The CEH certificate holder has proven that they are proficient in identifying weaknesses in computer networks and systems and addressing those vulnerabilities. This could entail utilizing hacking tools and techniques to pre-empt actual attacks and how to defend and protect against them to ...

What Is Operational Technology, and Why Is It Important In Today’s Computing Environments
By: Cybrary Staff
October 1, 2021

What is operational technology, and why is it important? In today’s dynamic IT environments, operational technology plays a central role in monitoring, securing, and controlling business-critical processes. In today’s hyperconnected world, it has become impossible for information technology to exist in a bubble. Defined perimeters and connections between systems are protected and monitored to uphold the highest possible integrity, security, ...

Top Four eCommerce Security Threats For 2021
By: Nihad Hassan
October 1, 2021

The Digital revolution impacts everything around us; nowadays, people use the Internet heavily in their daily lives. For instance, they use it to study, work, socialize, conduct online banking, and shop from the online marketplace. The ongoing spread of COVID-19 has changed customer buying behaviors dramatically; people have become more willing to shop from home, especially after the extended lockdown ...

Is The CEH Worth It?
By: Hugh Shepherd
September 30, 2021

Spending the time and money to earn certification is a commitment. Asking yourself, "Is this worth it?" is an understandable question and makes perfect sense. Certification exams can be expensive and require time to study, so you want to make sure investments of time and money will pay "dividends" in a career boost. Before pursuing a certification, candidates need to ...

Top Hacking Tools For Cybersecurity
By: Shimon Brathwaite
September 29, 2021

Cybersecurity professionals need to know many different things. For ethical hacking, several industry-standard tools have proven to be most effective. Especially as a beginner, when one’s programming skills aren’t highly developed, it helps to rely on pre-made software tools to find vulnerabilities and perform security assessments. Here I’ve provided a list of the top hacking tools one should learn to ...

What Is Application Security, and How Can You Implement It In Your Business
By: Shelby Welty
September 29, 2021

What is application security, and how can business leaders implement it? With opportunistic attackers constantly looking for software vulnerabilities, prioritizing application security has never been more important. According to the State of Software Security report by Veracode, three-quarters of apps have at least one security flaw, a quarter of which are considered severe. Furthermore, many apps had multiple security flaws, and given ...