0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Types of Access Control
By: Gabriel Schram
June 8, 2021

Human users are at the base of data protection. Therefore, determining who has access to certain resources is a major concern for organizations. Access control refers to which users and/or processes have access to specified resources within an organization or network. An access control list contains all of the rules for the varying levels of access to portions of a ...

Introduction to Data Classification
By: Nihad Hassan
June 8, 2021

The Digital revolution has changed everything around us; nowadays, organizations of all types and across all industries utilize digital solutions to facilitate work operations and reduce costs. People worldwide are using technology to work, study, socialize, entertainment, shopping, or online banking, to name only a few. The sum of people interactions with technology generates a large amount of digital data, ...

Artificial Intelligence Voting
By: Shimon Brathwaite
June 7, 2021

Artificial Intelligence is one of the growing areas of technology that's expected to change how we do many things. Many people are looking at the impact of AI on Cybersecurity, but one major area that people are trying to improve is how people select their politicians. Artificial intelligence is meant to solve a problem associated with people's lack of awareness ...

Crowdstrike Tips & Tricks
By: Owen Dubiel
June 7, 2021

Crowdstrike is an industry-leading EDR solution that is a must-have for any size enterprise. There are many features within Crowdstrike, and it can seem daunting to keep up with the weekly enhancements made to the Falcon platform. This article will uncover some of the most beneficial features to use on a day-to-day basis, along with some tips to streamline your ...

Advantages and Disadvantages of AI
By: Divya Bora
June 4, 2021

The Artificial Intelligence (AI) is an extensive branch of computer science that involves building smart machines capable of performing tasks that require human intelligence. AI enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. AI is an intelligent entity created by humans to make machines capable of thinking and acting humanely. ...

The Importance Of User Awareness Training For Phishing Emails
By: Shimon Brathwaite
June 4, 2021

Phishing is an attempt to receive sensitive information like usernames, passwords, or credit card numbers by impersonating an entity that the victim trusts. This can mean impersonating someone's friend, their manager, significant other, etc. This attack type is extremely successful because the human factor is the weakest link in an organization's security operations. Typically, technology will do whatever it is ...

Windows Log Primer
By: Page Glave
June 3, 2021

Why worry about logs? This is an entry-level introduction to Windows event logs in the context of cybersecurity. It will focus on Windows events that an analyst might want to look for to get familiar with the environment or start doing some threat hunting. Logs also help identify anomalies in user behavior that can provide valuable information about potential breaches. ...

Web Application Security
By: Darcy Kempa
June 3, 2021

Web application security has always been an important part of any cybersecurity program. Hardening web applications, protecting web servers, and using two-factor authentication (2FA) have helped protect businesses and consumers from data loss. However, the recent pandemic has increased the use of the internet for shopping, banking, and even social gatherings. It has changed the how and why of internet ...

Security vs. Compliance, What Is The Difference?
By: Nihad Hassan
June 2, 2021

In today's digital age, ensuring IT systems' security is a top priority for every organization worldwide. Cybersecurity attacks are increasing in both numbers and sophistication. Organizations are working daily to deploy the most effective security solutions (e.g., Firewalls, IDS/IPS, DLP) and implement different security controls and policies to protect their precious assets. According to Cyber Security Venture, cybercrime is projected ...

Network Fundamentals Course Review
By: Prasanna Peshkar
June 2, 2021

This Network Fundamentals course from Cybrary provides a general foundation for students who want to understand IT Networking, including core domains that work. This course will cover basic concepts of installing and configuring different network devices and the knowledge required to identify and interpret network topologies and delivers the student the expertise to provide feedback on network specifications. What ...