0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybersecurity Of The Internet Of Drones

By: Muhammad Bilal
October 19, 2020
There is a modern trend edging towards development in Unmanned Aerial Vehicles (UAVs). UAVs have supported various opportunities and opened paths at an effective cost in the development of technology. UAVs can be considered one of the best solutions in many surveillance areas, such as research, medical, agricultural, and transportation, due to the capability of dynamic reconfigurability, fast response, and ...
Of all the executive positions in the enterprise, few have evolved as quickly as the role of the CISO. Traditionally, a CISO’s role focused on technical tasks, an approach that was sufficient in the past given the less complex and relatively slow-moving nature of cyberthreats. Today, it is a very different picture, where cyber risk is everywhere, and technology is ...

Course Summary: NIST Privacy Framework

By: S.E. Williams
October 16, 2020
Overview of the NIST Privacy Framework The data-processing ecosystem of business environments is often highly complex and dynamic, with ever-changing interconnected relationships (Green, 2020). In such environments, every role, depending on its responsibilities, may use privacy-related data for varying outcomes. Implementing the NIST Privacy Framework gives an organization a method to better manage all its systems, controls, and ...

Is It Easy To Tweet As Anyone?

By: Vedant Jain
October 16, 2020
On the 15th of July, 2020, Twitter was Hacked. High profile accounts on Twitter posted a tweet to ask their followers to send Bitcoin. Twitter said it was a social engineering attack, while the media and others claimed it was an insider attack. No matter what the real cause was, human factors were involved. __This brings up an interesting and ...

STRIDE-Threat Modeling Technique

By: Krutik Poojara
October 15, 2020
Threat modeling is the security process by which we can identify, categorize, and analyze threats. It can be utilized to identify the gaps remaining and achieve security before starting a single code line at the design phase. Threat modeling aims to reduce the risk and put proper security controls where we think of the potential security threats. A threat model ...

How Can I Learn Information Technology

By: Seyi Omidire
October 15, 2020
Information technology is such a broad topic that you will need help in dissecting and breaking it down to understand it. It's like saying, "I want to learn medicine." The next question you'll probably be asked is," What or which area in medicine do you want to learn or focus on?" e.g., doctor, nurse, or pharmacy, And to break it ...

Introduction to the OWASP API Security Top 10

By: Gildásio Júnior
October 14, 2020
In today’s world, many innovations come as an app. Banking, health & fitness, and e-commerce are some prevalent examples. Commonly, these apps adopt a modern system design created as a microservice or split the front and backend responsibilities. This type of coding practice employs more use and creation of Application Programming Interfaces (APIs). As these APIs are another input point ...
Cybersecurity, one of the most well-spoken, researched, and heavily invested domains in the IT industry, has had a tremendous impact on almost (if not all) every business, startup, company, the government that depends on software technologies to achieve their goal and objective. With the advent of AI and Machine Learning algorithms, they have inevitably attracted the interest ...

"Azure Storage Accounts" Course Spotlight

By: Sudeep Phal
October 13, 2020
Every day, hour, minute, and second, an attacker is trying to breach an organization's data. So, any organization needs to keep its Crown Jewels safe and away from any potential threats. I went through this course on Azure cloud storage accounts, by Jeff Brown, in Cybrary. This course's difficulty level is marked to the beginner level, so there is no ...
Cybersecurity professionals are in high demand, but as noted by a recent GovTech piece, even skilled cybersecurity staff don't always find the job they want. While part of the problem stems from expectation imbalances, some job seekers aren't willing to settle for anything less than their dream job in their current city. Other IT pros are struggling to secure interviews even ...