0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybersecurity is a diverse and growing field. There are many paths a professional may take to becoming a cybersecurity expert. Also, there are distinct practice areas within the world of cybersecurity. One person may be an expert in technical aspects of cybersecurity, while another person's specialty may focus on compliance. Regardless of the cybersecurity professional's role, understanding how information technology ...

Top Cyber Threats in 2020

By: Divya Bora
July 30, 2020
What is a cyber-threat? You have probably heard the term cyber threat, as it is being used nowadays due to increased reliance on technology, but what does it actually mean? Cyber-threat refers to a malicious act that seeks to damage data, steal data, or disrupt digital life in general; such as computer viruses, data breaches, Denial of Service (DoS) attacks, or ...

Implementing Data Protection by Design

By: Dr. Edward Amoroso
July 30, 2020
Optimizing prevention, detection, and response in the cybersecurity challenges of tomorrow Data protection used to be relatively easy. Traditional firewalls would keep most of the external threats from getting into the company network, while antivirus software installed on endpoints would usually take care of those which did make it through. Additional layers of security, such as intrusion ...
For years, we have dreamed of the moment that we see unbelievably advanced technology, like flying cars, time machines, and many others, just like in the movies. Slowly, but surely, we take a step closer to that future. Many have dreams and hopes, and out of them, one stands above all. That reigning aspect would be none other than "Artificial ...
In this present day, you may receive phishing emails often, and some of us may even fall for such scams. Email Phishing attacks are by far the most common social attacks employed by cybercriminals and are on the rise. Phishing can also happen via text messages. The term phishing was coined because the scammers cast out a lure so that ...

Data Destruction Policy

By: Nihad Hassan
July 28, 2020
As the world continues to digitalize, the dependence on papers and photographs has become its lowest. Digital transformation has changed how we study, work, shop, communicate, travel, bank, and even how we take care of our health. Nowadays, most information is created digitally and does not go onto paper at all. Organizations of all types, both public and private, utilize computer ...

Office 365 Migration Course Review

By: Miguel Saiz
July 28, 2020
In the middle of the current pandemic, it has been proven that cloud services are a great tool to guarantee business continuity. Because Office 365 runs in the cloud, servers aren't needed for storage regarding websites, emails, or documents. Removing onsite servers will reduce both energy costs and the need for office space to store server hardware, which makes the cost ...

Big Data Analytics in Cybersecurity

By: Phillip Durst
July 27, 2020
What is Big Data? “Big Data” has become a bit of a catch-all term for really big sets of complex data. Complicated enough that traditional methods of analysis fail, and more information is presented than a human analyst could ever dream of processing. The idea of Big Data is important in modern business because businesses are inundated with ...

Azure or AWS: Which is Easier to Learn?

By: Matt Choi
July 27, 2020
Cloud adoption continues to rise as companies look for ways to empower remote workers, secure key documents anywhere, anytime, and deliver scalability on-demand. To streamline migration and make the best use of new cloud solutions, companies are looking for trained IT professionals — experts with the skills and certifications to solve challenges in-situ and seize opportunities at scale. They’re also looking ...
How enterprise security leaders are protecting their remote distributed teams Although remote work is certainly nothing new, the onslaught of the Covid-19 pandemic caught many businesses off-guard. For them, managing remote teams with so little time to prepare has proven challenging, bordering on burdensome. In a matter of days, they had to issue company-owned laptops, deploy new virtual machines, and ...