Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybrary Announces New Advisory Board to Support Company Growth
By: Shelby Welty
April 27, 2020

Top security veterans join in Cybrary’s mission to provide accessible cybersecurity and IT career development opportunities to anyone, anywhere Cybrary, the world’s largest, online cybersecurity career development platform, today announced the addition of four top security experts to its Advisory Board. These members will deliver strategic counsel and technical guidance to Cybrary, based on their in-depth industry expertise. The quartet collectively brings ...

DevSecOps: Integrating and Maturing a Security Culture
By: Phillip Kulp, Ph.D
April 24, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released Cybrary course, DevSecOps Fundamentals. This post is the first in a series that covers core principles to assist in the automation of a secure pipeline. Overview The series will address DevSecOps as a continuously maturing process. DevSecOps is not simply a method ...

Why is Privileged Access Management more important than ever
By: Thycotic
April 23, 2020

Did you know 62% of breaches are from privileged account abuse. But how can IT teams and cyber security professionals fight back? Privileged Account Management (PAM) introduces a fundamental security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. However, doing more isn’t always doing better. No one knows this more than ...

Is It Worth It To Learn IoT?
By: Suketh Evani
April 22, 2020

Every decade, human civilization experiences a new wave of technology and in the next decade, it is predicted that the Internet of things (IoT) is going to hit hard. Internet of things (IoT) is a collaboration of electronic devices and objects that are interconnected and can be identified uniquely. In layman’s terms, just like the internet, it is a group ...

Identifying Web Attacks Through Logs
By: Ravi Raj
April 20, 2020

Have you often found yourself lost while trying to understand web logs? Well, you are not alone; most people do as it is not an easy job to interpret web logs. An Akamai Report 1 from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) are the most common web attacks. Igor has compiled ...

Cybrary Announces New Scholars Program to Support Professionals Impacted by COVID-19
By: Shelby Welty
April 17, 2020

Program to offer a year of free online IT/cyber skills training and professional mentorship Today Cybrary is proud to announce our first Scholars Program to support those impacted by COVID-19 and who seek careers in the Information Technology (IT) and cybersecurity fields. As part of the inaugural cohort, program recipients will receive a free year of Cybrary’s Insider Pro ...

Global State of Least Privilege Cyber Security
By: Erin Duncan
April 15, 2020

Thycotic partnered with Cybrary, the cybersecurity workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone planning or already down the path with their own least privilege security program. The report, “[2020 Global State of Least ...

What Do You Learn in Cybersecurity
By: Ravi Raj
April 15, 2020

Cybersecurity has a lot of domains to learn from, but one thing that summarizes it is the “need to protect the Cyberspace from cyber attacks.” We are living in a time where data is a form of currency and needs to be protected from falling into the wrong hands. Cybersecurity always starts from the basics. All of the learning that ...

Manage Evidence and Preserve Data by Properly Managing Security Cases
By: Jenna Crawford
April 13, 2020

Security Incidents and Breaches It seems like every week, there are breaking news articles on the latest security incidents and security breaches to various organizations. Have you ever wondered how security professionals handle cases for these incidents and security events? Are you a security professional who regularly handles incidents or security cases and wonder if you are handling the ...

Penetration Testing Execution Standard (PTES)
By: Hugh Shepherd
April 10, 2020

Cybrary’s course on the Penetration Testing Execution Standard (PTES) is an outstanding training offering. This course covers all phases of the PTES in detail and shows how they’re applied in real-world situations. If you’re a business owner that utilizes penetration testing (pentest), a provider of pentest services, or someone just interested in ethical hacking (i.e., penetration testing), I highly recommend ...