0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Organizations continue to struggle with the ongoing challenge of securing their Kubernetes and container environments. Unfortunately, organizations don’t always emerge successful from that fight. That’s because even the best intentions sometimes don’t prevent organizations from suffering a security incident. But this raises some important questions. Who’s experiencing these security incidents, for instance? And what are the driving factors behind these events? StackRox ...
Top security veterans join in Cybrary’s mission to provide accessible cybersecurity and IT career development opportunities to anyone, anywhere Cybrary, the world’s largest, online cybersecurity career development platform, today announced the addition of four top security experts to its Advisory Board. These members will deliver strategic counsel and technical guidance to Cybrary, based on their in-depth industry expertise. The quartet collectively brings ...

DevSecOps: Integrating and Maturing a Security Culture

By: Phillip Kulp, Ph.D
April 24, 2020
Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released Cybrary course, DevSecOps Fundamentals. This post is the first in a series that covers core principles to assist in the automation of a secure pipeline. Overview The series will address DevSecOps as a continuously maturing process. DevSecOps is not simply a method ...
Did you know 62% of breaches are from privileged account abuse. But how can IT teams and cyber security professionals fight back? Privileged Account Management (PAM) introduces a fundamental security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. However, doing more isn’t always doing better. No one knows this more than ...

Is It Worth It To Learn IoT?

By: Suketh Evani
April 22, 2020
Every decade, human civilization experiences a new wave of technology and in the next decade, it is predicted that the Internet of things (IoT) is going to hit hard. Internet of things (IoT) is a collaboration of electronic devices and objects that are interconnected and can be identified uniquely. In layman’s terms, just like the internet, it is a group ...

Identifying Web Attacks Through Logs

By: Ravi Raj
April 20, 2020
Have you often found yourself lost while trying to understand web logs? Well, you are not alone; most people do as it is not an easy job to interpret web logs. An Akamai Report 1 from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) are the most common web attacks. Igor has compiled ...
Program to offer a year of free online IT/cyber skills training and professional mentorship Today Cybrary is proud to announce our first Scholars Program to support those impacted by COVID-19 and who seek careers in the Information Technology (IT) and cybersecurity fields. As part of the inaugural cohort, program recipients will receive a free year of Cybrary’s Insider Pro ...
Thycotic partnered with Cybrary, the cybersecurity workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone planning or already down the path with their own least privilege security program. The report, “[2020 Global State of Least ...

What Do You Learn in Cybersecurity

By: Ravi Raj
April 15, 2020
Cybersecurity has a lot of domains to learn from, but one thing that summarizes it is the “need to protect the Cyberspace from cyber attacks.” We are living in a time where data is a form of currency and needs to be protected from falling into the wrong hands. Cybersecurity always starts from the basics. All of the learning that ...
Security Incidents and Breaches It seems like every week, there are breaking news articles on the latest security incidents and security breaches to various organizations. Have you ever wondered how security professionals handle cases for these incidents and security events? Are you a security professional who regularly handles incidents or security cases and wonder if you are handling the ...