0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Securing Web Applications Standards and Vulnerabilties
By: Gabriel Schram
April 15, 2021

A web application runs on a server and is accessed by users through an active internet connection. Users submit requests through a browser or user interface (UI), then the web application server performs the task or carries out the request. Web applications are widely used today and provide the front-end for a vast array of online tools and platforms. Web applications ...

Are AWS Certifications Worth It?
By: Cami Ragano
April 14, 2021

Cloud Career Considerations: Are AWS Certifications Worth It? As noted by Forbes, Amazon now owns almost half of the public cloud infrastructure market worldwide and continues to enjoy a significant enterprise lead over its nearest competitors. While this is partly predicated on Amazon's role as the first large-scale public cloud offerings, the company isn't resting on its laurels; Amazon ...

Course Review: IoT Product Security
By: Hugh Shepherd
April 14, 2021

Course: IoT Product Security Instructor: Matthew Clark Cybrary's IoT Product Security course is an outstanding training offering. This is an excellent course to learn how to design and implement an IoT product security program. The course covers the requirements necessary to set up a functioning IoT product security program for organizations that design, manufacture, and sell IoT devices ...

Risk and Maturity Assessments In Health Care And The NIST CSF
By: S.E. Williams, MDI, MSc, Cybersecurity
April 13, 2021

Conducting a cybersecurity risk or control maturity assessment in the healthcare industry is a complicated undertaking with unique industry-specific challenges. This article provides a brief synopsis of a few of the risk assessment frameworks currently used in the healthcare industry. It also discusses how the National Institute of Standards and Technology (NIST) Cybersecurity Framework (NIST CSF) 1 has influenced ...

What Is Unified Threat Management
By: Nihad Hassan
April 13, 2021

Digital transformation is rushing to include all work aspects. Nowadays, organizations utilize digital technology to conduct most business functions. The huge dependence on it has resulted in shifting a significant part of cybercrime from the real world into what is now known as cyberspace. In today's complex cybersecurity world, organizations of all sizes and industries had to deploy different security solutions ...

Infrastructure as a Service (IaaS)
By: Nihad Hassan
April 12, 2021

As the digital transformation moves steadily to occupy all life aspects, people's dependence on digital technology to facilitate their daily lives increases. Not all organizations can afford the costs of adopting digital solutions to support all their work operations. For instance, digitizing all work processes will require hardware and software tools in addition to expertise (e.g., technical support costs). This ...

How To Become An IT Project Manager
By:
April 12, 2021

The IT project manager role requires qualified professionals to supervise IT projects and teams to make sure that projects meet time and budgetary guidelines. On this career path, students will learn how to perform key project management tasks and techniques that will allow them to seek management roles within the IT industry. Cybrary's expert instructors and virtual labs provide students ...

The Future Of Digital Transformation For Organizations
By: Nihad Hassan
April 9, 2021

As the world becomes increasingly digital, organizations' technology adoption continues to increase at a rapid pace. The world has significantly shifted towards adopting IT in all aspects of life, such as work, study, shopping, entertainment, and social life, since the start of the COVID-19 pandemic. To stop the spread of the disease, governments worldwide imposed physical distancing measures and ...

Cryptographic Algorithms Overview
By: Gabriel Schram
April 9, 2021

Cryptography uses security protocols to conceal the true meaning of users’ communications from potential adversaries or malicious actors. This is often done through encryption. Encryption is the process of converting plaintext data into ciphertext. Encryption is vital to the protection of data at rest or in use. This conversion is often directed using an algorithm. Algorithms act as sets of ...

Implementing a HIPAA Compliance Program Course Review
By: Prasanna Peshkar
April 8, 2021

Implementing a HIPAA compliance program is necessary to ensure that the company is loyal to all rules and laws set out in the HIPAA Privacy and Security Rules. A robust HIPAA compliance program is vital to assure that all sensitive documents, particularly medical data, are safe and appropriately secured from security breaches. This Implementing a HIPAA Compliance Program course from ...