0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

DevSecOps Pipeline: Deployment

By: Philip Kulp
September 23, 2020
Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the sixth in a series covering core principles to assist in the automation of a secure pipeline. Securing the Development Cycle What Are We Defending? [Pipeline: ...
Today Cybrary is releasing the complete findings from our “Cybrary Skills Gap Research Survey and Report,” studying the challenges, perceptions, and impacts of the cybersecurity skills gap faced by security teams worldwide. In addition to our comprehensive survey report, we produced the below infographic to highlight some of the most significant findings from the study. Feel free to share ...

How to Get Started with Cloud Security

By: Vivek Soni
September 21, 2020
What is Cloud Computing? Cloud computing is the delivery of on-demand computing services over the internet or dedicated network. Its infrastructure is a pool of hardware or software elements like servers, data storage, software, networking, etc. It offers a lot of advantages, including but not limited to: Cost-saving: As storage, processing capability, etc. are outsourced, which benefits the business by ...

Top 10 OSINT Tools

By: Nihad Hassan
September 21, 2020
A few decades ago, gathering intelligence about your target required sophisticated techniques and large budgets. Nowadays, one can achieve the same result by just having a computer and an internet connection. In today's information age, people became more dependent on computing technology and the internet in their daily lives. For instance, people are using the internet to communicate with each other, ...
How Will AI/ML Strengthen Cybersecurity & Prevent Breaches? Tales of crippling security breaches are not new. Despite the warnings and exposure that these issues receive, companies seem indifferent, and compromises are on the rise. Within the last ten years, there have been 300 data breach incidents that include the theft of more than 100,000 records. Here are some data breach statistics ...

Attack Surfaces vs. Vulnerabilities

By: Makeia Jackson
September 18, 2020
By now, we can assume that there is no such thing as foolproof security. The only way to fail-safe a network is to unplug it. Where there is technology or IoT, we can assume vulnerabilities may be present. For an organization to maintain a secure and resilient environment, it must focus on implementing and practicing good "cyber hygiene." Below are a ...
Everyone starts building in the cloud in different ways - for some, it's a necessity as an organization mandates that you're moving to the cloud. For others, the allure of services such as Lambda, DynamoDB, and S3 (the 8th wonder of the world!) are enough to persuade you to give the cloud a try. Whatever your impetus for playing in ...

Integrating Security with Data Science

By: Pierluigi Riti
September 17, 2020
Data Science becomes more important every day. More projects are created, and steps are taken in the direction of how to use all of the data. Cyber Security can gain a huge advantage from the use of Data Science. Some of the main areas that can take advantage of Data Science are Network analysis and Spam identification. In this article, ...
Building a security operations center (SOC) is a major undertaking, but it’s also an investment which empowers innovation and accelerates growth without adding undue risk. Establishing a SOC requires extensive planning combined with the optimal blend of technology, people, and process. The modern SOC is as much about people as it is technology. Success depends on the strong management of teams ...

How to Secure Data Across IT Estate

By: Pankaj Kamboj
September 16, 2020
As we all know, the 21st century belongs to data, making, or breaking an organization. Improper use of data or a leak of data can significantly harm an organization. Before you collect and use the data, whether it's your employee data or customer data, make sure you collect only those which is required for your business and at the same ...