0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Explore The Top Four DevOps Tools
By: Nihad Hassan
May 25, 2021

As the world moves steadily to become fully digital, organizations of all sizes and across all industries utilize digital solutions to facilitate work operations and communicate with customers. The rapid pace at which the IT industry advances raises many challenges for organizations, especially when developing IT solutions to enhance digital transformation efforts. DevOps is a set of philosophies, tools, and practices ...

Security Awareness
By: Darcy Kempa
May 24, 2021

One of the best security measures for any organization is to improve employee security awareness. This is because an organization can enhance its cybersecurity team's efforts by educating and engaging all employees. This way, the employees can help reduce risky behavior, report suspicious emails or activities, and improve an organization's cybersecurity posture at little to no, additional cost. Develop Interactive ...

Dependency Confusion - A New Supply Chain Attack Technique
By: payloadartist
May 24, 2021

Supply chain attacks are not new to the industry. They have been used in several high-profile breaches across. Supply chain attacks target less secure parts of an organization's supply chain to breach them. A Brief History of Supply Chain attacks The SolarWinds breach led to the compromise of various government and cybersecurity agencies due to a sophisticated supply chain attack. It ...

How To Become A Software Developer
By: Cami Ragano
May 21, 2021

Software development is an exciting and in-demand career in the IT industry. Many developer roles are available for qualified professionals, and opportunities continue to grow as technology advances. Students will learn to develop, create, maintain, and write or code new (or modify existing) software, applications, or specialized utility programs on this career path. With Cybrary's subject matter expert instructors, virtual ...

Security In The Cloud
By: Makeia Jackson
May 21, 2021

Public cloud usage is accelerating, and as businesses move their infrastructure and services to the cloud, many take advantage of a hybrid or multi-cloud approach. When companies utilize a hybrid or multi-cloud strategy, they decide to use different cloud services from various providers, such as Amazon Web Service (AWS), Microsoft Azure, or Google Cloud Platform (GCP), to name a few. ...

What is Multicloud?
By: Nihad Hassan
May 20, 2021

As the world rushes to adopt digital transformation in all aspects of life, organizations of all sizes and across all sectors are now leveraging digital solutions to run their operations and increase productivity. Since the start of the COVID-19 pandemic, the world has witnessed a massive shift in adopting the remote work model. Organizations have implemented this model to remain ...

Advanced Evimetry Forensic Acquisition: Allocated, Non-Linear Partial, and Live Images Course Review
By: Hugh Shepherd
May 20, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, discusses advanced forms of disk imaging using Evimetry. As mentioned in the course lecture, advanced forms of disk imaging are extremely beneficial in cases where the forensic process will not require a full disk image. Also, it is useful in situations where only certain file types will be ...

Detecting The Infamous LokiBot Malware Virus
By: Owen Dubiel
May 19, 2021

LokiBot is a nasty little malware virus that continues to advance as it ages. Lokibot is known for being an advanced credential and crypto-wallet stealer. This malware virus has been observed in several different industries and continues to refine and change its techniques. It was first seen in 2015 and has had over 12 confirmed mainstream appearances since then. Disgusting ...

What is SIEM? Security Solutions and Other Functions
By: Nihad Hassan
May 19, 2021

The digital revolution is changing everything around us. Nowadays, people utilize the internet to work, study, socialize, shop, bank, and relax, to name a few. In the business world, the internet significantly changed how companies bought, sold, interacted, and more. The concept of digital transformation is becoming more widely adopted after being a hot-debated topic for years. With the ongoing ...

Top Three UTM Solutions
By: Nihad Hassan
May 18, 2021

In today's Information Age, organizations heavily depend on digital technology to store and process their data. Most information is now created digitally and never finds its way to paper. The increased dependence on technology has resulted in shifting major criminal activities from the physical world into what is now known as Cyberspace. Cyberattacks are advancing in both sophistication and number. Global ...