0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

BYOD, or Bring Your Own Device, is a program by which employees can use their own devices for work purposes. End-user devices can be anything ranging from their laptops to their cell phones. BYOD is meant to allow more flexibility within an organization. Not only does it allow employees to work on equipment that is owned by them and, in ...

Cybrary's Free Courses | October 2020

By: Tatianna Harris
October 1, 2020
The holiday season is upon us, and we're making 7 of our premium courses, FREE. This month's free courses are centered around Cybersecurity Awareness. Here is what's available to you to learn for free in October. We’ve made 7 courses (that are normally paid!) completely FREE for the entire month of October. Now, your free membership for includes some ...

Why Use ARP Scan

By: Doug Bonderud
September 29, 2020
Knowledge is Power: The ARP-Scan Advantage Hackers are hiding in plain sight. As noted by HelpNetSecurity, hidden applications were responsible for almost half of all malicious activity last year, and attackers continue to develop new ways for these apps to avoid detection on corporate networks. There's an even bigger problem on the horizon: Devices. Most users now own multiple devices, including ...

Top 12 Computer Forensics Tools

By: Nihad Hassan
September 29, 2020
Top 12 Computer Forensics Tools Each year, millions of people enter the internet era by using different computing devices like laptops, tablets, and smartphones in today's digital age. The rapid expansion of digital society results in shifting a great number of crimes from the traditional routes to the digital crime discipline. Computer forensics (also known as digital forensics) is a branch ...

Dark Web Search: Introduction and Instruction

By: Nihad Hassan
September 28, 2020
Nowadays, cyber threats are coming from everywhere, from both the surface and the dark web. For instance, many enterprises rely on information collected from dark web communities to predict future attacks against their IT infrastructure and information systems. The World Wide Web is composed of three layers: the surface, deep, and dark webs. The surface–or normal - web is ...

How to Learn Cybersecurity On Your Own

By: Jitendra Singh
September 28, 2020
It is high time for all to start learning cybersecurity. The number of nefarious actors is on the rise in cyberspace. The regulations on information security are still not mature. Cybersecurity defends good actors from malicious attacks and unnoticed crimes perpetrated by threat actors. The impact of these crimes is manifold and may not necessarily manifest as theft, pilferage, financial loss, ...

The AES Block Cipher: Advanced Encryption Standard

By: Md. Abrar Jahin
September 25, 2020
Advanced Encryption Standard (AES) is a block cipher designed with some inherent flexibility. It can use three possible block sizes of b=128, 192, or 256 bits, and can use three possible key lengths n=128, 192, or 256 bits. The diagram below describes the smallest variant with b=128 and n=128. A key length n=128 was considered to be secure against brute ...

Why Is It Important to Have Employee Training

By: Ravi Raj
September 25, 2020
It is typical that companies hire people based on the skills that they possess. But still, there is a lot that a new hire or an existing employee needs to learn and train themselves to align with the work culture and adhere to a company's values and standards. Besides, they need to be trained about the company policies to ensure ...

CISM Requirements

By: Doug Bonderud
September 24, 2020
Embracing the Infosec Imperative? Consider CISM Infosec remains a top priority for organizations as both data volumes and attack vectors expand. Tech Republic noted 89% of companies now point to widespread threats such as phishing and ransomware as their biggest security issues. In comparison, 53% said problems with unpatched systems are paving the way for potential attacks. The result? There's no ...
Every business needs improved cybersecurity, but that doesn’t mean it’s something that sells itself. In fact, many businesses see cybersecurity as a cost center rather than an investment. Security leaders themselves often have a hard time communicating the benefits of improved cybersecurity from a business perspective. For cybersecurity practitioners, the sales process might seem ancillary to their roles, or even ...