0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Communicating Security Effectively To Executive Management
By: Elviraluke Napwora
March 7, 2022

With the increased growth in information security incidents and technology risk management, the need to engage the non-IT executive team in this conversation is becoming increasingly important. Cybersecurity is an organizational effort, and the various stakeholders involved need to understand the role they can play in protecting the business; for the executive team, their buy-in to the security solutions presented ...

What Makes A Cross-Functional Incident Response Team Effective?
By: Shimon Brathwaite
March 4, 2022

A cross-functional team/multidisciplinary team consists of people with different functional expertise who work together for a common objective. This is a very important aspect of having a balanced incident response team. As a hiring manager, you must budget wisely and hire people with the proper skill sets. Otherwise, your ability to perform investigations and resolve security incidents will become more ...

Enterprise Project Management: Elements, Implementation, Methodologies and Benefits
By: Divya Bora
March 3, 2022

eM header Enterprise Project Management(EPM) is the disciplined practice of managing projects simultaneously on an organizational level. It comprises implementing processes and strategies to streamline and enhance project management effectiveness on a large scale. Enterprise project management is a course designed to make readers deeply understand it. ESSENTIAL ELEMENTS OF EPM Enterprise project management comprises the following seven elements: elements of EPM __1. Risk ...

Top Seven Cybersecurity Soft Skills Interview Questions
By: Nihad Hassan
March 2, 2022

When hiring IT security professionals, recruiting managers are looking to find the best of the best. Most people, including those transiting into cybersecurity roles, think that having technical expertise (hard skills) is the main requirement for the cybersecurity profession; however, this is inaccurate. For instance, hard skills, such as familiarity with attack and defense techniques and tools and knowing how ...

Incident Response, Procedures, Forensics (Hands-on training)
By: Cybrary Staff
March 1, 2022

An introduction to incident response procedures and forensics Digital forensics and incident response play a vital role in business policy and law enforcement operations to remediate attacks and reduce risk. Summary: Enterprises depend on incident response and digital forensics to ensure that their mission-critical technology is sufficiently secure. These processes often incorporate red and blue teaming to test an organization’s existing ...

How To Communicate With Technical And Non-Technical Cybersecurity Clients
By: Shimon Brathwaite
February 28, 2022

As a cybersecurity professional, you will deal with many different people in day-to-day business. Technical clients mean someone with a lot of knowledge on how computers and information systems work. Non-technical clients represent employees that are more focused on the business side and don’t have a wrong understanding of computers and information systems. Your job requires you to communicate with ...

Five Critical API Security Vulnerabilities
By: Ambler Jackson
February 25, 2022

Application Programming Interfaces (APIs) are a fundamental part of modern software development. Organizations use APIs to enhance the user experience for their products and services. Almost every application uses an API. While APIs are valuable and necessary for any digital transformation strategy, they are also high-value targets for bad actors seeking to take over accounts, create fake accounts, or engage ...

IT Fundamentals Skills Assessment (Hands-on training)
By: Cybrary Staff
February 24, 2022

Why IT skills assessments are essential in the modern workplace Businesses must ensure the best candidates occupy their IT positions, so skills assessments are vital to acquiring and nurturing talent. Summary: *When hiring new employees or developing and promoting existing ones, running skills assessments can save valuable time while helping managers better understand the skills of individuals and teams. This way, ...

Defining The Incident Management Process
By: Nihad Hassan
February 23, 2022

In an accelerating digital world, any drop in IT service can have catastrophic consequences on the affected organization. For example, suppose a cybersecurity incident occurred and resulted in ceasing a major online retailer's IT system and networks; how much money of losses do you expect? According to the Ponemon Institute study, a DDoS attack will cost an average of $22,000 ...

What Is Incident Response and Why Companies Should Implement It?
By: Elviraluke Napwora
February 22, 2022

WHAT IS INCIDENT RESPONSE? Incident response is the organized process that organizations follow to identify, prioritize, contain, and eradicate a security incident while remediating the cause to prevent related incidents from recurring in the future. The ultimate goal of incident response is a quick turnaround in handling incidents to minimize damage and business impact. Therefore, it is an invaluable ...