0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Get Started With Cisco DevNet
By: Makeia Jackson
March 1, 2021

What is Cisco DevNet? Cisco DevNet is a program for anyone who wants to learn, write, develop, and integrate code with Cisco technologies, APIs, and SDKs. The platform includes the Internet of Things (IoT), cloud, networking, data center, collaboration, analytics, automation software, security, open-source, mobility, and customer experience technologies. DevNet provides learning paths and tracks that include labs, sandbox environments, ...

Digital Transformation In Healthcare: Top 5 Trends In 2021
By: Nihad Hassan
February 26, 2021

Since the onset of the COVID-19 pandemic, the world has witnessed an accelerated shift towards adopting digital technologies in all work areas, and the healthcare sector was not an exception. IT role in supporting business operations has become vital in a society that is increasingly dependent on digital. Organizations in all industries are under tremendous pressure to digitalize their services ...

Auto IMEI Changing Phone - The Untraceable Phone
By: payloadartist
February 26, 2021

What is IMEI? IMEI stands for International Mobile Equipment Identity. It is a unique identifier, or serial number, which is linked to a smartphone (and mobile phones). It is usually 15 digits long and allows devices to be tracked and located should they be stolen or used in criminal activity. In other words, an IMEI number can let one’s device ...

Cellular Phone Numbers Have Become Personally Identifiable Information (PII)
By: Darcy Kempa
February 25, 2021

Organizations and businesses spend resources protecting customer and/or employee personally identifiable information (PII). This mitigates risks associated with identity theft as well as protect the organization from fines and lawsuits. The evolution and popularity of cellular phones mean that a cell phone number is now considered PII. PII Background PII includes a broad category of information. The [Office ...

Introduction To Data Loss Prevention
By: Nihad Hassan
February 24, 2021

For many organizations in today's digital economy, protecting their data can be a matter of life or death. Data has become the lifeblood of enterprises in this information age. Most data is created digitally and never touches a physical medium (e.g., ink on paper). Digital data stored within an enterprise's IT – such as intellectual property, client data, financials, trade ...

Quantum Computing And Cybersecurity
By: Hugh Shepherd
February 23, 2021

Quantum computing (QC) is an up-and-coming technology and is widely considered the next monumental breakthrough in computing. It can potentially solve many of the most challenging and complex problems facing the world. Quantum computing can be extremely beneficial in many areas, such as space exploration, medical research, weather forecasting, climate change, artificial intelligence, traffic optimization, energy, finance, economics, and ...

How To Earn Your First Paycheck From A Career In Cybersecurity
By: Vijay Maripi
February 22, 2021

Cybersecurity is a fast-growing field where one can earn their paycheck as early as possible once they are profoundly skilled. Most organizations will have a team to protect their data and resources (servers, computer systems, internal networks) from cyber attacks. Within cybersecurity, there are plenty of areas one can specialize in, such as cloud security, network security, forensics, web application ...

Top 4 Cybersecurity Risk Management Certifications
By: Nihad Hassan
February 19, 2021

Cybersecurity threats are an urgent problem that most organizations struggle to handle. Recent statistics show an explosive increase in cyberattacks and data breaches, especially during the COVID-19 pandemic. Adopting the work-from-home model has weakened most organizations' security defenses because employees need to use their devices and home internet connections to remotely access corporate resources. A recent study by Varonis concluded that ...

Unpacking the Interview: Cyber Defense Analyst
By: Matt Choi
February 18, 2021

Unpacking the Interview: Cyber Defense Analyst As cyber threats continue to evolve, companies are searching for skilled professionals to deploy, manage, and maintain security infrastructure at scale. Known as Cyber Defense Analysts, these professionals earn above-average salaries for above-average responsibilities. They’re highly skilled and qualified and possess the ability to think on their feet when faced when critical security challenges. But ...

How to Update Burp Suite in Kali Linux
By: payloadartist
February 18, 2021

While this information might already be available in various online forums or quickly retrieved via searching online, there are certain situations where manual intervention might be needed to update the Burp Suite installation in Kali Linux. Upon opening the Burp Suite application in Kali, there is a persistent alert notification that prompts downloading a new version of Burp Suite. Even ...