Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What is Multicloud?
By: Nihad Hassan
May 20, 2021

As the world rushes to adopt digital transformation in all aspects of life, organizations of all sizes and across all sectors are now leveraging digital solutions to run their operations and increase productivity. Since the start of the COVID-19 pandemic, the world has witnessed a massive shift in adopting the remote work model. Organizations have implemented this model to remain ...

Advanced Evimetry Forensic Acquisition: Allocated, Non-Linear Partial, and Live Images Course Review
By: Hugh Shepherd
May 20, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, discusses advanced forms of disk imaging using Evimetry. As mentioned in the course lecture, advanced forms of disk imaging are extremely beneficial in cases where the forensic process will not require a full disk image. Also, it is useful in situations where only certain file types will be ...

Detecting The Infamous LokiBot Malware Virus
By: Owen Dubiel
May 19, 2021

LokiBot is a nasty little malware virus that continues to advance as it ages. Lokibot is known for being an advanced credential and crypto-wallet stealer. This malware virus has been observed in several different industries and continues to refine and change its techniques. It was first seen in 2015 and has had over 12 confirmed mainstream appearances since then. Disgusting ...

What is SIEM? Security Solutions and Other Functions
By: Nihad Hassan
May 19, 2021

The digital revolution is changing everything around us. Nowadays, people utilize the internet to work, study, socialize, shop, bank, and relax, to name a few. In the business world, the internet significantly changed how companies bought, sold, interacted, and more. The concept of digital transformation is becoming more widely adopted after being a hot-debated topic for years. With the ongoing ...

Top Three UTM Solutions
By: Nihad Hassan
May 18, 2021

In today's Information Age, organizations heavily depend on digital technology to store and process their data. Most information is now created digitally and never finds its way to paper. The increased dependence on technology has resulted in shifting major criminal activities from the physical world into what is now known as Cyberspace. Cyberattacks are advancing in both sophistication and number. Global ...

Privacy Program Management Course Review
By: Shimon Brathwaite
May 14, 2021

What is The Privacy Program Management course? A privacy program is a set of standards used to define, maintain, and implement policies and procedures that allow for effective information privacy practices. It is essential for any organization that collects or processes sensitive data on paper or electronically. The need to understand privacy has increased over the years as more ...

Keeping Safe From Cybercriminals When Making Online Transactions
By: Nihad Hassan
May 14, 2021

As the digital transformation continues steadily to enter all life aspects, a growing number of internet users are choosing to purchase products/services and pay their bills online. Since the start of the COVID19 pandemic, the world has witnessed a massive increase in digital technology adoption in work, study, life, entertainment, and social activities. For instance, a survey - of about ...

Top 4 Digital Transformation Trends In 2021
By: Nihad Hassan
May 13, 2021

During the previous ten years, a heated debate appeared in the news about integrating digital technology into business processes and other work areas. However, the year 2020 accelerated the adoption of specific digital technologies, boosted by coronavirus's ongoing spread. Since the start of the COVID19 pandemic, governments worldwide imposed social distancing to reduce the disease's spread. General lockdowns were enforced ...

How To Secure Digital Assets In A Convenience-first Culture?
By: Shimon Brathwaite
May 13, 2021

Security is often considered a hindrance to convenience. To make something more secure usually requires setting limits or preventing users from performing certain actions. It can cause a problem in some situations because people want to do work in the fastest and easiest way possible. It's important to have a good balance between convenience and security to ensure a company ...

Mind the Gap — The Prescriptive Potential of Targeted Security Training
By: Mike Gruen, CISO at Cybrary
May 12, 2021

There’s a growing disconnect in cyber defense — while recent predictions suggest infosec spending could top 40 percent of corporate budgets in 2021, cyberattacks are also on the rise. As noted by Forbes, 80 percent of enterprises surveyed say they lack sufficient protection against emerging infosec threats. At the same time, new IBM data shows an uptick in specific attack ...