0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Course Spotlight: Student Data Privacy Governance
By: Arun Vembanatt
November 4, 2020

Student Data Privacy Governance is one of the most discussed topics off-late. As you may be aware, the world has gone online due to the COVID pandemic, which has affected the entire planet. Especially for students, be it primary schooling or kindergarten, everything has become online, exposing their privacy. I should say that the Author Ivy Nelson has done a fantastic job selecting ...

Where To Get Cybersecurity Certifications
By: Shelby Welty
November 4, 2020

Right Place, Right Time: Where to Get Cyber Security Certifications When it comes to career potential, cybersecurity offers both expanding opportunities and increasing compensation. According to the U.S. Bureau of Labor Statistics, the average salary for infosec professionals now tops $99,000. The job market is predicted to grow at 31% through 2029, much faster than comparable industries. But landing cybersecurity jobs ...

What Is Cybersecurity Architecture
By: Nihad Hassan
November 3, 2020

Cybersecurity architecture, simply put, is a framework that defines the structure of an organization's cybersecurity posture, which includes consideration for its policies, standards, and business objectives. It accounts for the organization's computers, network devices, network interconnects, security capabilities, and the data that resides within the whole environment. The organization's foundational defense plan is considered to protect against cyber threats and ...

In A Complex World, Resiliency Protects
By: Corey Holzer, Ph.D. CISSP
November 3, 2020

In a Complex Cyber World Resiliency Protects In today's interconnected world, a business' network health is vital to the organization's health. In this information age, network failure means lost revenue and the potential for the business' failure. News outlets regularly report about breaches and stolen data at a faster pace than in the past. While the scope of a recent ...

Reverse Engineering: Everything You Need To Know
By: Prashant Sharma
November 2, 2020

Over the past hundreds of years, we have witnessed a drastic change in products and technology. Due to continuous advancement in technology, we have seen many products remain as relevant as they were years ago. However, the case is not the same for all the products. As time progresses, many products malfunction, and some even break down completely. We ...

Cybrary's Free Courses | November 2020
By: Shelby Welty
November 2, 2020

It's that time again... This month's free courses focus on growth and development. Here is the November lineup of free courses. You saw our "spooktacular" special courses that were free in October, and now we're coming at you with a whole new set for November! We’ve made 7 courses (that are normally paid!) FREE for the entire month of ...

Data Privacy in the Cloud – A Primer
By:
October 30, 2020

Navigating privacy and regulatory challenges in the age of the cloud Our increasing reliance on data, coupled with the evolving cyberthreat landscape, has given rise to the need for new regulations and other safeguards for protecting information. In the western world, the overarching trend has been to give consumers greater control over their data, including who collects it, how, and ...

Security In Smart And Connected Health
By: Rahul Saranjame
October 30, 2020

Ever since healthcare services integrated technology and the landscape of information flow changed, the industry has been tasked with addressing portability, accessibility, and patient data security. To understand the implications of confidentiality and privacy in smart and connected health, it is worthwhile to understand why hospitals and healthcare institutions are such a profitable target for cyber-attacks. The primary reason is ...

Top Paying Cybersecurity Certifications
By: Shelby Welty
October 28, 2020

Critical Compensation: The Top Paying Cybersecurity Certifications Money matters. While cybersecurity professionals often enter the field with passion and pursue long-term infosec careers because they care about helping companies protect digital data assets, interest alone doesn't buy groceries or keep the lights on. So it's no surprise that security professionals often find themselves wondering which certifications help secure the best compensation ...

Introduction To Cyber Threat Intelligence
By: Nihad Hassan
October 28, 2020

Cyber Threat Intelligence (CTI) is still considered a relatively new field in cybersecurity; however, the practice of intelligence is regarded as an old and mature discipline. There are multiple definitions of intelligence; however, the essence of intelligence is collecting information to support the decision-making process. According to the UK National Crime Agency (NCA): “Intelligence is information that is received or collected ...