0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

This blog post is brought to you by Thycotic * Our new co-published report with Cybrary explores least privilege strategies and why companies need to make it a priority. Most organizations struggle with complexity and user complaints when implementing a least privilege security strategy 67% say least privilege is either a top or urgent priority for their ...
There are a plethora of cyberattacks that occur every day, and these incidents not only cause millions of losses, but also creates a dire need for these companies to enhance their security measures. This creates a huge demand for certified and well-equipped cybersecurity specialists. So we are going to focus on highlighting the top 15 cybersecurity certifications for 2020 that ...

Cybrary Scholars Program Recipients Announced

By: Garrett Wilson
May 14, 2020
Cybersecurity Professionals Impacted By COVID-19 Awarded Learning Resources and Mentorship to Further Career Development With the launch of the Cybrary Scholars Program last month in response to the current health crisis and resulting economic impacts, we sought to offer a glimpse of hope to those impacted by COVID-19 and who seek careers in the Information Technology (IT) and cybersecurity fields. ...
Nowadays, many enterprises rely on deploying their solutions on Cloud. The Cloud is a set of data centers that can be geographically dispersed. Clouds provide many services which can be distinguished by the following three points: Software as a Service (SAAS): consists of deploying a software (ex: an application) directly reachable from the Internet. Infrastructure as a Service (IaaS): consists ...

Is CompTIA Certification Worth It?

By: John Nguyen
May 13, 2020
Certifications from CompTIA like A+, Network+, and Security+, are among the most popular credentials that are sought after by students who are just beginning their IT career. As the leading provider of IT certification programs, CompTIA also has more advanced certifications available for IT professionals who are farther along their career paths. Despite the popularity, you may still be wondering ...
This blog was originally posted on Cisco Security Blog by author J. Wolfgang Goerlich. Reposted with permission. We’re announcing our newest Cybersecurity Series report, “Big Security in a Small Business World”, which looks into how small to medium-sized organizations are embracing cybersecurity to grow their businesses. We’re releasing this report during a challenging time in our lives. We know and understand SMBs ...
In the wake of the current world situation, people, teams, and organizations are looking to leadership for guidance and instruction, now more than ever. One important aspect to understand about enterprise leadership is knowing that the main focus is on outcomes and working on behalf of the organization. Dr. Edward Amoroso, former CSO at AT&T and current CEO of ...

The Phishing Tale

By: Unnati Guha
May 12, 2020
Long ago, fishermen used fishnets for catching fish. These nets would catch every fish that would swim through it. A little later, they started using spear-like weapons to aim at the desired kind of fish. This allowed them to select the type of fish species they wanted to catch. And then, they went on to catch big fish like whales ...
What is cybercrime? A crime that involves using a computer and a network is classified as cybercrime, and people who commit these crimes are called cybercriminals. A cybercriminal can target individuals by targeting their property, the person himself, harming their mental health, and can even cause damage to governments. Anyone using a computer and a network can be targeted. ...
Cybersecurity & Programming! Do they even relate? Programming causes panic to many people at first sight of humongous lines of code even to perform a straightforward task such as printing “Hello, world!” on the screen. But the moment you start your career as a cybersecurity professional, you realize that it offers a wide range of specializations. What is mostly overlooked ...