Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Rise Of The Virtual Conference. Reflections On Black Hat Asia
By: Daryl Sheppard
November 5, 2020

Without a doubt, this year has been a different one; and one that I doubt anyone would have anticipated come January 1. While unquestionably COVID has been terrible for the world, it has created a virtual conference. Rather than canceling major events that would have gathered thousands of people together in an unsustainable and unsafe environment, many events successfully pivoted ...

Threat Hunting Tools
By: Nihad Hassan
November 5, 2020

The active process of detecting abnormal activity within a computer network or system (e.g., server, workstation, mobile device, or IoT device) is called Cyber Threat Hunting. Discovered activities can be a sign of an ongoing attack (e.g., encrypting ransomware), exfiltration of data, command and control activity, or other malicious activity. Threat hunting is an active defense that works by proactively ...

Course Spotlight: Student Data Privacy Governance
By: Arun Vembanatt
November 4, 2020

Student Data Privacy Governance is one of the most discussed topics off-late. As you may be aware, the world has gone online due to the COVID pandemic, which has affected the entire planet. Especially for students, be it primary schooling or kindergarten, everything has become online, exposing their privacy. I should say that the Author Ivy Nelson has done a fantastic job selecting ...

Where To Get Cybersecurity Certifications
By: Shelby Welty
November 4, 2020

Right Place, Right Time: Where to Get Cyber Security Certifications When it comes to career potential, cybersecurity offers both expanding opportunities and increasing compensation. According to the U.S. Bureau of Labor Statistics, the average salary for infosec professionals now tops $99,000. The job market is predicted to grow at 31% through 2029, much faster than comparable industries. But landing cybersecurity jobs ...

What Is Cybersecurity Architecture
By: Nihad Hassan
November 3, 2020

Cybersecurity architecture, simply put, is a framework that defines the structure of an organization's cybersecurity posture, which includes consideration for its policies, standards, and business objectives. It accounts for the organization's computers, network devices, network interconnects, security capabilities, and the data that resides within the whole environment. The organization's foundational defense plan is considered to protect against cyber threats and ...

In A Complex World, Resiliency Protects
By: Corey Holzer, Ph.D. CISSP
November 3, 2020

In a Complex Cyber World Resiliency Protects In today's interconnected world, a business' network health is vital to the organization's health. In this information age, network failure means lost revenue and the potential for the business' failure. News outlets regularly report about breaches and stolen data at a faster pace than in the past. While the scope of a recent ...

Reverse Engineering: Everything You Need To Know
By: Prashant Sharma
November 2, 2020

Over the past hundreds of years, we have witnessed a drastic change in products and technology. Due to continuous advancement in technology, we have seen many products remain as relevant as they were years ago. However, the case is not the same for all the products. As time progresses, many products malfunction, and some even break down completely. We ...

Cybrary's Free Courses | November 2020
By: Shelby Welty
November 2, 2020

It's that time again... This month's free courses focus on growth and development. Here is the November lineup of free courses. You saw our "spooktacular" special courses that were free in October, and now we're coming at you with a whole new set for November! We’ve made 7 courses (that are normally paid!) FREE for the entire month of ...

Data Privacy in the Cloud – A Primer
By:
October 30, 2020

Navigating privacy and regulatory challenges in the age of the cloud Our increasing reliance on data, coupled with the evolving cyberthreat landscape, has given rise to the need for new regulations and other safeguards for protecting information. In the western world, the overarching trend has been to give consumers greater control over their data, including who collects it, how, and ...

Security In Smart And Connected Health
By: Rahul Saranjame
October 30, 2020

Ever since healthcare services integrated technology and the landscape of information flow changed, the industry has been tasked with addressing portability, accessibility, and patient data security. To understand the implications of confidentiality and privacy in smart and connected health, it is worthwhile to understand why hospitals and healthcare institutions are such a profitable target for cyber-attacks. The primary reason is ...