0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Is Secure Coding, And Why Does It Matter?
By: Cybrary Staff
September 28, 2021

With software vulnerabilities being a top target for hackers, it is more important than ever to start thinking about security when coding new software. While today’s security leaders are well aware of the need to keep their software updated, in many cases, the root of the issue lies with software development itself (Almost two-thirds of data breaches in 2019 [involved unpatched ...

How To Secure IoT Systems
September 28, 2021

The proliferation of internet-connected systems other than computers and mobile devices has dramatically expanded attack surfaces, hence the need for IoT security. To suggest that cybersecurity used to be easy might seem hard to believe for new ones. In the old days, security largely revolved around antivirus software installed on endpoints, network firewalls, and locked doors. It was defined by the ...

When Should I Learn Ethical Hacking?
By: payloadartist
September 27, 2021

Should one learn ethical hacking? People often ask if they should start learning ethical hacking, and the answer to that is yes, they should. Ethical hacking is still ripe with opportunities and relevant and practical skills. Before deciding whether one should learn ethical hacking, it is pertinent to know what ethical hacking is, and what purpose it serves, What is ethical ...

TIPs To Protect Your Cyber Environment
By: Nihad Hassan
September 27, 2021

Cyberattacks are increasing in both sophistication and number. No organization is immune to cyberattacks; organizations of all sizes and across all industries are subject to cyberattacks. In recent times, cyberattacks have skyrocketed at an unprecedented rate. As most organizations were forced to adopt the work-from-home model, cybercriminals exploited this fact and boosted their cyberattacks against corporate networks and employees' endpoints ...

Is Red Teaming Know-how Crucial For Cybersecurity Professionals?
By: Evan Morris
September 24, 2021

Cybersecurity professionals are like medical doctors. You cannot expect them to know everything about protecting IT assets. Instead, they have specializations or areas where they focus their expertise. For example, they are data loss prevention, IT architecture and policy, governance and compliance, penetration testing, secure DevOps, incident response and forensic analysis, or secure software development. Independent information security consultant [Kevin ...

CEH vs Security+
By: Prasanna Peshkar
September 23, 2021

Many people who have just entered the cybersecurity world or skilled IT professionals want to earn various certifications such as Security+ certification and the CEH (certified ethical hacker). Many people try to get both certifications one after the other to shine their skillful range and rise in cybersecurity. Yet, there is an inconsistency observed amongst the beginners to strive for ...

Deep Web Browsing For Threat Intelligence
By: Shimon Brathwaite
September 23, 2021

The Internet is significantly larger than most people can imagine. Anytime we search for a website on search engines such as Google, we only receive results from indexed websites; all these websites combined consist of less than 10% of the total amount of web pages available on the Internet. The rest of the Internet is known as the Deep Web. ...

What Is CCSP Certification?
By: Cybrary Staff
September 22, 2021

Holding a CCSP certification demonstrates the technical expertise and knowledge required to build, implement, and maintain secure cloud-based data systems. Summary: *Becoming a Certified Cloud Security Professional offers a proven way for security experts to accelerate their career development and help tackle some of the most pervasive challenges today’s business leaders face. The certification is broadly recognized in the industry, but ...

Is Ethical Hacking A Good Career?
By: Vijay Maripi
September 22, 2021

Hacking produced numerous online crime and theft problems in IT, where the Internet brought people worldwide closer. Various alternatives and techniques that interfere with the privacy of the individual are available. Therefore, security has become a primary concern in the digital world. Even many IT companies have encountered financial losses and infringements due to security problems. The method to deal ...

How To Secure PII From Threat Actors
By: Nihad Hassan
September 21, 2021

As the world continues its movement to become fully digital, people's dependence on digital technology to conduct all types of work increases. These days, most data is created digitally and never goes into the paper. According to Statista, the total amount of data created, captured, copied, and consumed globally is forecasted to increase rapidly to reach more than 180 zettabytes ...