0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top Four eCommerce Security Threats For 2021
By: Nihad Hassan
October 1, 2021

The Digital revolution impacts everything around us; nowadays, people use the Internet heavily in their daily lives. For instance, they use it to study, work, socialize, conduct online banking, and shop from the online marketplace. The ongoing spread of COVID-19 has changed customer buying behaviors dramatically; people have become more willing to shop from home, especially after the extended lockdown ...

Is The CEH Worth It?
By: Hugh Shepherd
September 30, 2021

Spending the time and money to earn certification is a commitment. Asking yourself, "Is this worth it?" is an understandable question and makes perfect sense. Certification exams can be expensive and require time to study, so you want to make sure investments of time and money will pay "dividends" in a career boost. Before pursuing a certification, candidates need to ...

Top Hacking Tools For Cybersecurity
By: Shimon Brathwaite
September 29, 2021

Cybersecurity professionals need to know many different things. For ethical hacking, several industry-standard tools have proven to be most effective. Especially as a beginner, when one’s programming skills aren’t highly developed, it helps to rely on pre-made software tools to find vulnerabilities and perform security assessments. Here I’ve provided a list of the top hacking tools one should learn to ...

What Is Application Security, and How Can You Implement It In Your Business
By: Shelby Welty
September 29, 2021

What is application security, and how can business leaders implement it? With opportunistic attackers constantly looking for software vulnerabilities, prioritizing application security has never been more important. According to the State of Software Security report by Veracode, three-quarters of apps have at least one security flaw, a quarter of which are considered severe. Furthermore, many apps had multiple security flaws, and given ...

What Is Secure Coding, And Why Does It Matter?
By: Cybrary Staff
September 28, 2021

With software vulnerabilities being a top target for hackers, it is more important than ever to start thinking about security when coding new software. While today’s security leaders are well aware of the need to keep their software updated, in many cases, the root of the issue lies with software development itself (Almost two-thirds of data breaches in 2019 [involved unpatched ...

How To Secure IoT Systems
By:
September 28, 2021

The proliferation of internet-connected systems other than computers and mobile devices has dramatically expanded attack surfaces, hence the need for IoT security. To suggest that cybersecurity used to be easy might seem hard to believe for new ones. In the old days, security largely revolved around antivirus software installed on endpoints, network firewalls, and locked doors. It was defined by the ...

When Should I Learn Ethical Hacking?
By: payloadartist
September 27, 2021

Should one learn ethical hacking? People often ask if they should start learning ethical hacking, and the answer to that is yes, they should. Ethical hacking is still ripe with opportunities and relevant and practical skills. Before deciding whether one should learn ethical hacking, it is pertinent to know what ethical hacking is, and what purpose it serves, What is ethical ...

TIPs To Protect Your Cyber Environment
By: Nihad Hassan
September 27, 2021

Cyberattacks are increasing in both sophistication and number. No organization is immune to cyberattacks; organizations of all sizes and across all industries are subject to cyberattacks. In recent times, cyberattacks have skyrocketed at an unprecedented rate. As most organizations were forced to adopt the work-from-home model, cybercriminals exploited this fact and boosted their cyberattacks against corporate networks and employees' endpoints ...

Is Red Teaming Know-how Crucial For Cybersecurity Professionals?
By: Evan Morris
September 24, 2021

Cybersecurity professionals are like medical doctors. You cannot expect them to know everything about protecting IT assets. Instead, they have specializations or areas where they focus their expertise. For example, they are data loss prevention, IT architecture and policy, governance and compliance, penetration testing, secure DevOps, incident response and forensic analysis, or secure software development. Independent information security consultant [Kevin ...

CEH vs Security+
By: Prasanna Peshkar
September 23, 2021

Many people who have just entered the cybersecurity world or skilled IT professionals want to earn various certifications such as Security+ certification and the CEH (certified ethical hacker). Many people try to get both certifications one after the other to shine their skillful range and rise in cybersecurity. Yet, there is an inconsistency observed amongst the beginners to strive for ...