0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top Three Data Loss Prevention Software
By: Nihad Hassan
May 4, 2021

In recent years, data breaches have increased significantly due to the rise in the number of organizations entirely reliant on digital systems to run their business operations. Nowadays, most data is created digitally and not stored on paper. Data is considered the most important asset that organizations need to protect to remain in compliance with the various laws and ...

VPN Protocols Guide
By: Owen Dubiel
May 4, 2021

Using a VPN service when online is one of the most critical professional and personal steps anyone can take to improve their overall security stance. But choosing a VPN service can be easier said than done. Understanding your goals for the service and understanding which protocols are needed to best suit those goals is essential. The last thing anyone wants ...

How the Popular ML models work
By: Divya Bora
May 4, 2021

“Machine Learning is focused on computers learning and acting like a human, and improve learning with time autonomously by feeding data and information in the form of observations and real-world interactions.” Machine Learning (ML) is considered an application of Artificial Intelligence (AI) that enables systems to automatically learn and improve without being explicitly programmed. An algorithm is a sequence of statistical ...

What Is Hybrid Cloud?
By: Nihad Hassan
May 3, 2021

The digital transformation is moving steadily to occupy all aspects of life. People become dependent on technology to work, study, socialize, entertainment, online banking, or for shopping, to name only a few. This rapid acceleration of technology has shifted the world into what is now known as the information age. Nowadays, organizations of all types and across all industries ...

GDPR, Cookie Consent, and User Privacy
By: Nihad Hassan
May 3, 2021

The General Data Protection Regulation (GDPR) is the most robust and comprehensive privacy global law and was enforced on May 25, 2018. GDPR replaces the previous data protection laws that were not comprehensive and did not cope with the advancement of Internet technologies and the increasing volume of personal data published online. GDPR applies to all EU (European Union) residents and ...

MS-500: Microsoft 365 Security Administration Course Review
By: Prasanna Peshkar
April 28, 2021

The Microsoft 365 Security Administration course from Cybrary is intended for students to develop them to take and pass the MS-500 certification exam. The course includes the four fields of the exam, giving students the expertise and abilities they need to earn their credentials. What is the MS-500 Certification? Students for this exam apply, maintain, and control security and compliance solutions ...

Tenable Jira Cloud Integration
By: Owen Dubiel
April 28, 2021

Tenable provides security teams with a ton of vulnerability data on all assets, but how much of this is actionable in its current state. Utilizing Tenable's two-way integration with Jira cloud empowers its users to create an intuitive dashboard that provides insight into their existing security stance. Also, the integration allows you to handle remediation in a streamlined, automated approach. ...

Introducing Goals: Connecting team learning to on-the-job outcomes
By: Cybrary Announcement
April 28, 2021

Cybrary’s new Goals feature makes it easy to measure and demonstrate the impact of cybersecurity training and skills development As organizations expand, business leaders are held accountable for their teams’ increased performance and overall development, but many struggle to ensure their teams are putting in the work necessary to develop their skills and add value to the business. Given the ...

Ransomware Prevention Strategies
By: Gabriel Schram
April 27, 2021

Identifying the tactics, techniques, and procedures of modern ransomware attacks is pivotal in securing cyber defense architecture. Recent years have exposed new and more successful variants for this specific type of malware. Ransomware is a type of malware that encrypts the entirety of the target system and demands a paid ransom to restore its data. Figure 1 displays an example ...

Types of Artificial Intelligence
By: Divya Bora
April 27, 2021

Artificial Intelligence (AI) is an extensive branch of computer science that involves building smart machines capable of performing tasks that require human intelligence. AI enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. It is an intelligent entity which humans create to make machines capable of thinking and acting humanely. Few programmable functions ...