0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Security Guidelines for Working Remotely From Home
By: Krutik Poojara
April 30, 2020

Most of us are working from home due to the current situation that has arisen from COVID-19. At the office, there is an infrastructure to protect you while accessing the internet, but at home we need to take care of security ourselves. Here, we will explore a few techniques which we can use to achieve the goal of securing ourselves ...

Misconfigurations – The Most Common Security Incident Involving Your Containers and Kubernetes
By: David Bisson
April 30, 2020

Organizations continue to struggle with the ongoing challenge of securing their Kubernetes and container environments. Unfortunately, organizations don’t always emerge successful from that fight. That’s because even the best intentions sometimes don’t prevent organizations from suffering a security incident. But this raises some important questions. Who’s experiencing these security incidents, for instance? And what are the driving factors behind these events? StackRox ...

Cybrary Announces New Advisory Board to Support Company Growth
By: Shelby Welty
April 27, 2020

Top security veterans join in Cybrary’s mission to provide accessible cybersecurity and IT career development opportunities to anyone, anywhere Cybrary, the world’s largest, online cybersecurity career development platform, today announced the addition of four top security experts to its Advisory Board. These members will deliver strategic counsel and technical guidance to Cybrary, based on their in-depth industry expertise. The quartet collectively brings ...

DevSecOps: Integrating and Maturing a Security Culture
By: Phillip Kulp, Ph.D
April 24, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released Cybrary course, DevSecOps Fundamentals. This post is the first in a series that covers core principles to assist in the automation of a secure pipeline. Overview The series will address DevSecOps as a continuously maturing process. DevSecOps is not simply a method ...

Why is Privileged Access Management more important than ever
By: Thycotic
April 23, 2020

Did you know 62% of breaches are from privileged account abuse. But how can IT teams and cyber security professionals fight back? Privileged Account Management (PAM) introduces a fundamental security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. However, doing more isn’t always doing better. No one knows this more than ...

Is It Worth It To Learn IoT?
By: Suketh Evani
April 22, 2020

Every decade, human civilization experiences a new wave of technology and in the next decade, it is predicted that the Internet of things (IoT) is going to hit hard. Internet of things (IoT) is a collaboration of electronic devices and objects that are interconnected and can be identified uniquely. In layman’s terms, just like the internet, it is a group ...

Identifying Web Attacks Through Logs
By: Ravi Raj
April 20, 2020

Have you often found yourself lost while trying to understand web logs? Well, you are not alone; most people do as it is not an easy job to interpret web logs. An Akamai Report 1 from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) are the most common web attacks. Igor has compiled ...

Cybrary Announces New Scholars Program to Support Professionals Impacted by COVID-19
By: Shelby Welty
April 17, 2020

Program to offer a year of free online IT/cyber skills training and professional mentorship Today Cybrary is proud to announce our first Scholars Program to support those impacted by COVID-19 and who seek careers in the Information Technology (IT) and cybersecurity fields. As part of the inaugural cohort, program recipients will receive a free year of Cybrary’s Insider Pro ...

Global State of Least Privilege Cyber Security
By: Erin Duncan
April 15, 2020

Thycotic partnered with Cybrary, the cybersecurity workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone planning or already down the path with their own least privilege security program. The report, “[2020 Global State of Least ...

What Do You Learn in Cybersecurity
By: Ravi Raj
April 15, 2020

Cybersecurity has a lot of domains to learn from, but one thing that summarizes it is the “need to protect the Cyberspace from cyber attacks.” We are living in a time where data is a form of currency and needs to be protected from falling into the wrong hands. Cybersecurity always starts from the basics. All of the learning that ...