0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Security Considerations For Code Signing
By: Divya Bora
January 29, 2021

Code signing is defined as a process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. Code signing certificate software helps digitally sign data that is available online and plays a crucial role in preventing third party access while downloading software online. TYPES OF ...

Cybersecurity in Connected Autonomous Vehicles
By: Hugh Shepherd
January 28, 2021

Autonomous vehicles (AV) are becoming mainstream in our society. Globally there's an ongoing development and testing of autonomous vehicles in several countries, setting the stage for widespread adoption of self-driving cars. It is projected that, by 2025, there will be 8 million autonomous or semi-autonomous vehicles on the road, and by 2030, more than 18 million. The estimated autonomous vehicle ...

Instant Solution to Combine Multiple PST Files in Outlook 2016 and 2013
By: justin hansen
January 22, 2021

Microsoft Outlook is one of the most popular email client software. The reputation of Outlook can be mainly attributed to its easy-to-use graphical interface and up-to-date security enhancements. Connectivity with other advanced technologies makes Microsoft Outlook stand out in the crowd against other email clients. However, the ease and complexity are indirectly proportional to each other in the technological fields. ...

Integrating The NIST CSF With Industry-Specific Frameworks
By: S.E. Williams, M.S., Cybersecurity
January 21, 2021

Heading into 2021, organizations may be searching for better methods to manage and reduce their company's cybersecurity protection challenges, which may involve using industry-specific cybersecurity assessment tools. The question is, "Where to start?" The answer is to customize the current cyber-risk assessment tool by integrating it with the National Institute for Standards and Technology Cybersecurity Framework (NIST CSF). This article ...

DES (Data Encryption Standard)
By: HamzaMegahed
January 21, 2021

DES (Data Encryption Standard)DES: DES is a symmetric-key block cipher adopted in 1977 by the National Institute of Standards and Technology(NIST) and was initially created by an IBM team. Symmetric indicates that the cipher will use the same key to encrypt or decrypt the given input data & block indicates that the cipher will take a fixed-sized block as an ...

Five Benefits Of Earning DoD-Approved Certifications For MSSPs
By: Trevor Halstead
January 14, 2021

IT security management is critical for operational success — regardless of industry, market, or vertical. For any organization with lingering doubts, the pandemic pressures of 2020 have made this protective priority crystal clear. As noted by GovTech, this year saw not only the highest number of records ever breached but also a substantive uptick in ransomware efforts as attackers looked to ...

Top 7 Platforms to Manage Secrets and Sensitive Information
By: Evan Morris
January 13, 2021

SolarWinds and FireEye hacks are a major catastrophe that could have been avoided with some best security practice. Passwords, API tokens, privacy keys, and other sensitive information are regarded as secrets. They are supposed to be kept hidden but many threats will persistently try to uncover them. Protecting these secrets is not an easy task, especially with volume and when ...

How to Break PST File Passwords or Unlock PST Files
By: Rude Jonson
January 12, 2021

MS Outlook is the world's most popular email client program used to manage the Exchange emails that improve business performance. MS Outlook stores its email files in a PST file format, and this file must remain secure so no third party can access it without permission. The best technique for securing this file is to protect it with a password. ...

Why (Many) Programmers Prefer Linux Over Windows
By: mrNayaNi
January 9, 2021

Linux was developed and publicly released by Linus Torvalds in September 1991. Linux is a free and open-source operating system, unlike either Windows OS or macOS. Linux offers multiple desktop and server distros. Typically the Linux OS is employed for cloud and server software. Some popular Linux distros are Ubuntu, Debian, and RedHat Enterprise Linux. Because Linux is free and ...

SOC Analyst: Career Path Overview
By: Olivia
January 8, 2021

SOC stands for Security Operation Center. A SOC is staffed with cyber-security professionals who work as a team to protect an organization's IT assets from cyberthreats. A SOC analyst's role is not merely limited to protecting IT infrastructure. Instead, a SOC analyst's primary role is assessing the target organization's IT infrastructure for weaknesses and suggesting countermeasures to improve its defenses ...