0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



As society moves steadily to become fully digital, human dependence on digital systems to work, study, shop, and socialize will increase. Securing access to these systems is vital to protect the user's identities and data. Digital authentication systems play an integral role in securing IT systems in today's information age. The ability to identify yourself among billions of connected people is ...


The focus of this article is implementing the NIST CSF within an AWS Cloud Environment. It follows earlier Cybrary articles, which introduced the NIST CSF and integrating the framework with other industry-specific methods to conduct cybersecurity risk and control maturity assessments. Brief History of the NIST CSF The NIST CSF 1 is a cybersecurity assessment-type framework developed by ...


Organizations select internal controls to protect their assets. The assets can vary from data to network equipment to personnel. These have one thing in common; they provide value to the organization. A control, therefore, must address a vulnerability and mitigate risk to an asset. New vulnerabilities are being found and reported almost daily. These new findings are listed on the Common ...


A cyberattack is a term used to describe any attack against a computerized system, networks, or personal computing devices. A cyberattack aims to gain unauthorized access to, shut down, or damage sensitive resources and computing systems. As the digital transformation moves at a steady pace, organizations' dependence on technology will increase. Most data are now stored digitally in so-called data centers ...


WHAT IS HILL CIPHER? The Hill cipher is a polygraphic substitution cipher that is based on the concepts of linear algebra. A polygraphic substitution is a cipher where uniform substitution is performed on letter blocks. The techniques used in the Hill cipher comprise linear algebra, which is an area of mathematics and requires an elementary understanding of matrices. The Hill ...


The ongoing COVID-19 crisis has forced most organizations to adopt the work from home model. The workforce's major shift to work from home has significantly impacted how businesses operate and use technology in their daily operations. According to Global Workplace Analytics, they estimate that 56% of the U.S. workforce holds a compatible job (at least partially) with remote work, and ...


Cybercrime is more common than ever, and the attacks are getting more complicated. The eyes and skills of a qualified expert witness are crucial. The possibility of becoming an expert witness in court can be a difficult one. The question and answer scenario in which one must witness can look uncomfortable. This course addresses the purpose of the expert witness, ...


The ongoing pandemic of coronavirus disease has forced most companies to adopt a work from home model. The Interpol has issued many reports about the impact of COVID-19 on cybercrime activities worldwide and noticed a significant increase in cyberattacks during the COVID-19 crisis against government organizations, big enterprises, and critical infrastructure. As a result of the general shutdown enforced worldwide, most ...


Mobile phones have made their way into daily life and infrastructure to the point of societal dependence. As a result, massive amounts of data and personal information are stored on users' cellular devices. To store the data that is specific to a user's phone, companies use SIM cards. SIM (Subscriber Identity Module) cards store information specific to the device ...


The topic of digital transformation (DT) has occupied news headlines for a while. However, the ongoing COVID-19 pandemic has pushed the matter to a very urgent status. DT integrates technology into all aspects of business operations, enhancing customer experience and increasing work operations efficiency. To be successful, DT adopters should change their business culture to cope with all the needs ...