0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

SIEM vs SOAR: What’s The Difference?
By: Owen Dubiel
March 23, 2021

Technology and cyber threats alike are advancing more every day. In the security community, we must strive to push forward with innovation to keep up with the latest threats. One way of accomplishing this is through the utilization of a SOAR (Security Orchestration automation & response) platform. It takes the traditional SIEM solution to the next level. Gone are the ...

Splunk Enterprise Certified Administrator Course Review
By: Shimon Brathwaite
March 22, 2021

What is Splunk? It's a software tool that makes machine data on multiple machines across the network available for analysis, better known as SIEM (Security Incident Event Management). It does this by collecting data, identifying patterns, providing metrics, diagnosing problems, and performing basic analytics on all the machines that have had the Splunk agent installed on them. This information ...

How To Become A Data Analyst
By: Matt Choi
March 22, 2021

The Data Analyst career path teaches students to determine how data can answer questions and solve problems. Students will learn how to examine data from multiple sources to provide security and privacy insights in the courses included. They will also learn to design and implement workflow processes, layouts, and custom algorithms for multifaceted, enterprise-level data sets used for data mining, ...

MacOS Terminal: Create a Bootable USB from an ISO Using "dd"
By: kedlogic
March 19, 2021

WHAT IS THE "dd" COMMAND? dd is a command-line utility for Linux and Unix systems whose primary purpose is to convert and create low-level file copy. The dd command's syntax differs from various other Unix programs, as it uses syntax option=value rather than the standard syntax -option value or -option=value formats. By default, the dd command reads from stdin ...

How Passwordless Authentication Works
By: Nihad Hassan
March 16, 2021

As society moves steadily to become fully digital, human dependence on digital systems to work, study, shop, and socialize will increase. Securing access to these systems is vital to protect the user's identities and data. Digital authentication systems play an integral role in securing IT systems in today's information age. The ability to identify yourself among billions of connected people is ...

How to Implement the NIST CSF with the AWS Cloud for Risk and Control Maturity Cybersecurity Assessments
By: S.E. Williams, MDI, MSc, Cybersecurity
March 16, 2021

The focus of this article is implementing the NIST CSF within an AWS Cloud Environment. It follows earlier Cybrary articles, which introduced the NIST CSF and integrating the framework with other industry-specific methods to conduct cybersecurity risk and control maturity assessments. Brief History of the NIST CSF The NIST CSF 1 is a cybersecurity assessment-type framework developed by ...

Updating Internal Audit Controls
By: Darcy Kempa
March 15, 2021

Organizations select internal controls to protect their assets. The assets can vary from data to network equipment to personnel. These have one thing in common; they provide value to the organization. A control, therefore, must address a vulnerability and mitigate risk to an asset. New vulnerabilities are being found and reported almost daily. These new findings are listed on the Common ...

Top 3 Common Network Attack Types
By: Nihad Hassan
March 15, 2021

A cyberattack is a term used to describe any attack against a computerized system, networks, or personal computing devices. A cyberattack aims to gain unauthorized access to, shut down, or damage sensitive resources and computing systems. As the digital transformation moves at a steady pace, organizations' dependence on technology will increase. Most data are now stored digitally in so-called data centers ...

Learn Hill Cipher with 3x3 Matrix Multiplicative Inverse Example
By: pnp.007
March 12, 2021

WHAT IS HILL CIPHER? The Hill cipher is a polygraphic substitution cipher that is based on the concepts of linear algebra. A polygraphic substitution is a cipher where uniform substitution is performed on letter blocks. The techniques used in the Hill cipher comprise linear algebra, which is an area of mathematics and requires an elementary understanding of matrices. The Hill ...

Top 5 Remote Monitoring And Management Tools
By: Nihad Hassan
March 11, 2021

The ongoing COVID-19 crisis has forced most organizations to adopt the work from home model. The workforce's major shift to work from home has significantly impacted how businesses operate and use technology in their daily operations. According to Global Workplace Analytics, they estimate that 56% of the U.S. workforce holds a compatible job (at least partially) with remote work, and ...