0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

(Best CISSP Training) Top Tips To Help You Pass The CISSP Exam
By: Charles Owen-Jackson
August 24, 2021

Top tips to help you pass the CISSP exam Passing a CISSP exam requires a lot of hard work, but the efforts are more than worth it at a time when cybersecurity professionals are in short supply. Preparing for and ultimately passing the certified information systems security professional (CISSP) exam is the most difficult task in that it requires careful planning ...

Best Practices For Privileged Access Management
By: Divya Bora
August 24, 2021

PRIVILEGED RISKS AND THREATS Some of the most frequently occurring top-privilege related risks and challenges are: Risk due to over-provisioning of privileges Overly restricted privilege accounts can disrupt the user workflow, resulting in frustration and impeding productivity. IT admins generally provision end-users with a great set of privileges as end-users enjoy the excess privileges. Since an employee’s role often ...

Top Programming Languages For Malware Analysis
By: Shimon Brathwaite
August 23, 2021

Malware Analysis is the process of studying malware to determine its function, origin, and potential impact. A common use case is for companies that develop anti-virus/anti-malware solutions. They need to have an in-depth understanding of several different malware samples to find indicators that they can use to detect them. Also, companies like Virustotal have built their entire business around being ...

Top Six Network Security Tools
By: Nihad Hassan
August 23, 2021

Cyberattacks are increasing rapidly in terms of number and sophistication. According to Cyber Security Ventures, the global cost of cybercrime is projected to reach $10.05 trillion by 2025 annually. A cyberattack can have severe consequences on the affected business. The most significant impact is losing business reputation and customers' trust and losing revenue and sales without forgetting the massive fines ...

Multi-cloud Security Best Practices
By: Nihad Hassan
August 20, 2021

Digital transformation is accelerating to include all of an organization's work aspects. Regardless of their size and industry, organizations are increasingly utilizing digital technology to facilitate work operations and improve efficiencies. The most apparent aspect of the increased usage of IT technology is the increased usage of cloud computing models in the business world. According to ComputerWorld UK, 80% of organizations ...

Burp Suite Tutorial Part 4: Getting Started With Burp Intruder
By: payloadartist
August 20, 2021

A brief overview of Burp Suite was given in the previous posts, including hotkeys to improve productivity, Burp Proxy, the request interceptor feature, and Burp Repeater. This post will focus on the core features of Burp Suite’s Intruder tool, which is very popular for brute-forcing and fuzzing web applications and APIs. Burp Intruder is useful in many auditing and ...

Best Privacy Browsers For User Privacy
By: Shimon Brathwaite
August 19, 2021

It is well known that both governments and corporations are collecting people’s information for profit. Therefore, user privacy is an important concern for many individuals. Programs such as the Fourteen Eyes Surveillance Alliance not only prove that there is a plan to gather information on everyday civilians, but it shows that it has been developed and ongoing for several years. ...

Data Science: The Path To Understand Where We Are And Will Go
By: Divya Bora
August 19, 2021

WHAT IS DATA SCIENCE? According to Wikipedia, Data science is an interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data and apply knowledge and actionable insights from data across a broad range of application domains. It relates to data mining, machine learning, and big data. DATA SCIENCE LIFECYCLE The ...

(Best CISSP Training) 5 Essential Considerations for Choosing the Best CISSP Training Solution (Best CISSP Training Topic Cluster)
By: Charles Owen-Jackson
August 18, 2021

Five essential considerations for choosing the best CISSP training solution Although many certifications are available in the cybersecurity field, becoming a certified information systems security professional is one of the best. There are few better ways to take a career in cybersecurity to the next level than becoming a certified information systems security professional (CISSP). According to ISC2, the accrediting organization, ...

What Is Big Data Security?
By: Nihad Hassan
August 18, 2021

Digital transformation is rushing to occupy all aspects of our lives. Organizations of all sizes and across all industries are utilizing digital solutions to store and process data. Nowadays', most data are created digitally and never find their way into papers. The volume of digital data is growing at an explosive rate and will reach an unprecedented size. According to ...