0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Privacy Issues With AI As They Intertwine In Our Lives Deeper Everyday
By: Prasanna Peshkar
April 2, 2021
As more companies are adopting Artificial Intelligence (AI) as a core component of their digital transformation, there is a demand for panels to concentrate on the risks associated with AI's handling of personal data and the possible preference and unpredictability of its output. AI has been in the world of IT for a while; yet, over the past few years, ...
Announcing Cybrary's Free Certification Courses Available Through April 30th
By: Garrett Wilson
April 2, 2021
Cybrary's April free courses are now open for enrollments to all users. Certifications are a critical part of achievement and proof of knowledge and skills in cyber today. So here are 6 certification courses free to everyone through April 30, 2021. Systems Security Certified Professional (SSCP) AZ-103 Microsoft Azure Administrator AWS Certified Cloud Practitioner Cisco Certified Network Associate (CCNA) ...
Burp Suite Tutorial Part 2: Essential Shortcuts in Burp Suite Proxy for More Productivity
By: payloadartist
April 1, 2021
Enhancing Productivity with Burp Suite Shortcuts Improving skills in Burp Suite can prove incredibly helpful while testing web applications and becoming a better pentester. Particularly, while testing larger web applications, using the right hotkeys in Burp Suite can be a great way to optimize manual application security audits. Not just penetration testers, bug bounty hunters too can hugely benefit by ...
Best SIEM Tools in 2021
By: Nihad Hassan
April 1, 2021
The widespread adoption of digital technology has shifted a significant volume of crimes from the physical world into cyberspace. Cyberattacks are increasing in sophistication and numbers. Worldwide cybercrime cost is projected to be $10.05 billion annually by 2025. The estimated losses of cybercrime have been reflected worldwide by increasing spending on security solutions significantly. According to [International Data Corporation (IDC) ...
Cloud Security Policy Fundamentals
By: Nihad Hassan
March 31, 2021
The ongoing spread of coronavirus has forced many companies to change their operating philosophies. The most notable change was in the massive shift from employees working on-site to a remote workforce model. With the increased number of people (both employees and clients) accessing IT systems remotely, the large-scale adoption of cloud technologies has become necessary for businesses. Cloud technology brings ...
How To Become A Program Manager
By: Shelby Welty
March 31, 2021
The Program Manager career path prepares students for a management-level role in an organization's IT department. Students on this path will learn how to lead, coordinate, integrate, and be accountable for the success of an organizational program while maintaining alignment with the company's priorities or enterprise. The program manager career path will help students develop a core technical program leadership ...
End User VPN Security Course Review
By: Prasanna Peshkar
March 30, 2021
Virtual private networks (VPNs) have become prevalent, especially with individuals, because they give high-level security without risking availability. They are simple to configure and use and are one of the most important cybersecurity advantages available today. In this End User VPN Security course from Cybrary, students will learn VPNs' history and who is required to utilize a VPN. This course ...
Email Hacking Techniques To Watch In 2021
By: Nihad Hassan
March 30, 2021
Email is considered the primary vehicle used to carry out different types of cyberattacks. According to many reports, phishing and spear-phishing email are the preferred attack vectors used by cybercriminals to exploit organizations' IT systems. Security Boulevard published a report listing statistics about phishing attacks in 2020. Phishing attacks are mainly conducted via email messages. Spear-phishing attacks cause 95% of cyberattacks ...
Sumo Logic Daily Checks For Success
By: Owen Dubiel
March 29, 2021
Working within a SIEM solution doesn't have to be an overwhelming task. Furthermore, Sumo Logic makes it easy and streamlined for security teams to manage, triage, and respond to daily events without too much overhead work. This article will cover some of the daily tasks that a security analyst should be doing and some of the Sumo Logic features you ...
Top 4 Business Process Management Software
By: Nihad Hassan
March 29, 2021
Business Process Management Software: What are they? And Which BPM are the leaders in the industry? Digital transformation has accelerated significantly during the ongoing COVID19 pandemic; this forces many companies to change their business operations processes to remain operational. Business process management (BPM) has become a key enabler of digital transformation. Gartner defines it as follows “*as the coordination ...