0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Free and Useful Tools for DNS and Network Troubleshooting When troubleshooting network or DNS problems related to your website, server or other online services, free and useful tools can help you reduce your troubleshooting time.I'll go through five categories of functionality, covering tools that let you: Perform DNS lookups Perform ...


"Thanks to Apple’s tight control over its app store and operating system, threats to iPhones and iPads have been infrequent and limited in scale. This changed in 2015. In 2015, [Symantec] identified nine new iOS threat families,compared to four in total previously. Bootlegged developer software, ...


Common Methods to Secure PHP Application Input Data PHP is one of the most versatile languages in recent history for web applications, sites and services. But, this versatility means it also has large vectors for exploitation and attack, which has led many to scrutinize the language as flawed or insecure by design.However, this is a belief created and ...


CyberPop is a quick way to learn definitions and facts about cyber security. Today’s Question: What's SIEM Answer: The combined process of incident detection and incident response (pronounced “sim”). Includes features such as alerts, analytics, dashboards and forensic analysis. Learn more terms in Cybrary's Glossary .


Hi All! Today, I’m going to share something about the new Cloud Technology called “The Fog Computing.” Applications such as health-monitoring or emergency response require near-instantaneous response and the delays caused by contacting and receiving data from a cloud data-center can be highly problematic.“Fog Computing” is a response to this challenge. The basic idea is to shift ...


For many, the use of social media is second nature, but care should always be taken. This is particularly true in the case of the use of corporate Twitter accounts, and how your organization is represented to the outside world. It’s not a case of acceptable use policies (AUP), but more about common sense.This list ...
![[podcast] DFIR conference, DFIR policy controls, and a bit of news](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-027-DFIRpolicycontrols.mp3[/embed]Mr. Boettcher is back! We talked about his experiences with the#DFIR conference, and we get into a discussion about the gap between when incident response is and when you're using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response is required.We also discuss the Eleanor malware very briefly and I talk about finding Platypus, ...


Recently, Cybrary released the "My Notes" feature, which members use to their personal record notes while take free cyber security training class . Since its inception, many users have leveraged this tool to capture critical information, thoughts and ideas. Researchers found that if important information was contained in notes, it had a 34 percent chance of being ...


CISA Exam - Video Tutorials Steps of Risk Assessment: In this video, we'll learn the steps to follow while conducting risk assessment. This is very important concept from the CISA exam point. You can expect a minimum 5 to 7 questions on the exam on this concept. The Question, Answer and ...


SIEM is like the choirmaster of all your security devices. Other systems only perform/provide the following: Intrusion detection system (IDS) only understand Protocols,Packets & IP addresses. Asset management systems check apps, owners and business processes. Service logs show configuration changes, logins and service activities. Endpoint security takes ...