0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

PMP Certification
By: Doug Bonderud
September 15, 2020

Management Potential: Unpacking the PMP Certification Project completion rates are on the rise — recent survey data found that in 2018 almost 70 percent of projects met their original goals, and just under 60 percent stayed on budget. As projects grow in size and scope; however, success becomes elusive: IT projects with budgets over $1 million are 50 percent more ...

Blockchain Technology In Information Security
By: Divya Bora
September 15, 2020

WHAT IS BLOCKCHAIN TECHNOLOGY? Simply put, Blockchain is a system of having information recorded in a way that makes it difficult to change, hack, or cheat the system. A blockchain is generally a digital ledger of duplicated transactions and distributed across the entire network of systems on the Blockchain. Each block contains a number of transactions, and every time a ...

Patch and Vulnerability Management
By: Ravi Raj
September 14, 2020

Unpatched vulnerabilities are one of the easiest ways for attackers to enter an environment. According to a new ServiceNow study conducted by the Ponemon Institute, an alarming 57% of cyberattack victims report that their breaches could have been prevented by installing an available patch. And 34% of those respondents were already aware of the vulnerability before they were attacked. The ...

Active Directory Best Practices
By: Miguel Angel Saiz
September 11, 2020

The use of LAN networks and Active Directory (AD) by companies is a common practice today. In a world interconnected by the internet, more and more companies, public centers, and even home users create LAN networks where they interconnect their computer equipment for better access. Active Directory provides a service located on one or more servers, capable of creating objects ...

Artificial Intelligence for Beginners
By: Carlos Almeida
September 11, 2020

People often become intrigued, or maybe even shellshocked, by the prospect of working with artificial intelligence. But where should one begin? This article will focus on defining and breaking down the various pieces that make up the subfields of artificial intelligence and provide insights into what further topics can be pursued in this learning journey. What is AI? Unlike comparing two ...

Information Sharing in Cybersecurity
By: Adnan Khan
September 9, 2020

Cybersecurity offers the protection of data and information systems from outside sources. For us to efficiently combat evolving cyber threats, information sharing is unquestionably a valuable resource. When malicious attackers scoop out innovative methods to exploit vulnerabilities, many organizations are facing becoming victims of the same exploits multiple times. Albeit new cyber threat detection technologies are continually emerging and Darknet ...

How To Safely Access The Dark Web
By: Apurv Singh Gautam
September 9, 2020

There’s a lot of speculation and mystery around the dark web. Often, when the dark web is mentioned, people presume it is mainly about criminal activities and that what goes on, on the dark web, is shady (pun intended). Although there’s some truth to it, the dark web has many excellent and useful things also. To access these useful resources, ...

Assembly Course Spotlight
By: Andreea Alexandra Bancu
September 8, 2020

What is Assembly? Assembly language, often abbreviated asm, is a low-level programming language designed for a specific processor. An assembly language may be produced by compiling source code from a high-level programming language (such as C/C++), or it can be written from scratch. Assembly code is converted to machine code using an assembler 1 . This program translates combinations ...

Introduction to DOS and DDOS
By: Sudipta Banerjee
September 8, 2020

What are Cyber Threats? The definition of “Cyber” has seen multiple transitions from the late ’90s to the current era. It was referred to as the science of understanding machines and animals' movement in 1950, or, more commonly, “Cybernetics.” The new definition of “Cyberspace” evolved in 1990, when people believed in the existence of a physical space beyond the electronic ...

State Sponsored Surveillance - The New Norm?
By: Pandu Vardhan
September 4, 2020

Technology and surveillance With the increased use of smartphones and growing technologies like Artificial Intelligence (AI), the public has become an easy target for mass surveillance. Also, the smartphone industry is increasingly less focused on user privacy and security. As smartphones are always active, they are susceptible to various tracking forms, like cellular signals, GPS, Bluetooth, and Wifi. In today's ...