0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Network Fundamentals Course Review
By: Prasanna Peshkar
June 2, 2021

This Network Fundamentals course from Cybrary provides a general foundation for students who want to understand IT Networking, including core domains that work. This course will cover basic concepts of installing and configuring different network devices and the knowledge required to identify and interpret network topologies and delivers the student the expertise to provide feedback on network specifications. What ...

Why The CISSP Is Important For Management?
By: Shimon Brathwaite
June 1, 2021

The Certified Information Systems Security Professional (CISSP) is the most in-demand Cybersecurity certification, especially if you're interested in a management position. The goal of the CISSP is to prove that successful candidates have a broad knowledge base across several different areas of Information Security. As a result, CISSP certified individuals make an average of $116,573 globally, making it the third ...

Introduction To Data as a Service (DaaS)
By: Nihad Hassan
June 1, 2021

In today's Information Age, most data is created digitally and not on paper; the sum of digital data is massive to the extent that no one can predicate its accurate size. According to Statista, the volume of data/information created, captured, copied, and consumed worldwide has reached up to 59 zettabytes in 2020. Handling the massive amount of data, special tools ...

The Importance Of Data Security
By: Shimon Brathwaite
May 28, 2021

Data security means protecting digital data from unwanted actions or unauthorized access by users. The failure to protect digital data results in a data breach, which can have a huge impact on the profitability of a business. On average this incident costs a company about $3.24 million and decreases the price of shares by 7% on average. About 60% of ...

What Is Shadow IT?
By: Nihad Hassan
May 27, 2021

Digital transformation is increasingly dominating organizations' IT space. The most apparent aspect was using cloud computing to facilitate business operations, reduce costs, and enhance work efficiencies. According to globenewswire, the cloud-computing industry is projected to increase from $371.4 billion in 2020 to $832.1 billion by 2025, at a compound annual growth rate of 17.5%. The increased adoption of different [cloud ...

US Information Privacy Course Review
By: Jeff Durst
May 27, 2021

The Privacy Problem The idea of "privacy," especially when it comes to personal data, continues to change at a breakneck pace. It is no secret that almost every social media platform and search engine collects millions of data points about their users. The data is used for countless applications ranging from harmless (targeted ads) to downright diabolical (selling data ...

Fighting Fire: How MITRE Helps Cybersecurity Teams Stay Cool Under Pressure?
By: Matt Choi
May 27, 2021

Pressure is ramping up for cybersecurity teams. As noted by Forbes, attack volumes increased by 435% in 2020 alone, ransomware cost companies more than $11.5 billion, and at least 125 distinct malware families have now been detected worldwide. The result? It is not a matter of if your business will come under fire. Instead, it is a series of stressful questions: ...

Security Event Log 101: Using Arcsight To Identify When Logs Are Cleared
By: Owen Dubiel
May 26, 2021

One of the telltale signs that you might have a nefarious entity lurking around your network could happen without even knowing it. Some Hacker groups tend to cover their tracks after they perform a payload. One way bad actors can clean up after themselves is by clearing the security event logs for the systems they are working on. Having the ...

Career Paths In A SOC
By: Shimon Brathwaite
May 26, 2021

Security Operation Centers (SOCs) is the central unit that handles all security issues on an organization level. SOCs receive alerts from all the SIEMs and other security monitoring tools that an organization has in place and analyzes those alerts to determine what is going on within the company network. It is a great place to begin your cybersecurity career because ...

Cybersecurity Controls Checklist
By: Charlie Crane
May 25, 2021

Building a robust cybersecurity program often feels like an impossible task. This feeling can be caused by complex enterprise environments, company politics, vendor scaremongering, and jargon-packed marketing material that promises to provide you the silver bullet for the next-gen fileless malware. It doesn't have to be this way. If we boil cybersecurity breaches down and peel away the marketing, we find ...