0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Rethinking perimeter security in the age of distributed, virtualized computing environments
By: Dr. Edward Amoroso
November 9, 2020

This article was written to accompany the Designing Enterprise for Multi-Cloud course, on Cybrary. Enterprise computing has come a long way from the localized packet-switched networks of old. Today’s environment consists of a complex array of autonomous systems all over the world working together to get data where it needs to be. But as technology evolves, so too does the threat ...

The Importance of Cybersecurity in IoT
By: Gabriel Schram
November 6, 2020

The all-encompassing internet of things (IoT) is expanding at a rate that correlates with the influx of newer technologies at our disposal. Interconnectivity between devices is at an all-time high with no peak in sight. Moreover, IoT devices are taking on increasingly vital roles in fields and industries across the spectrum. The prospect of worldwide connectivity in a diversity of ...

Five Reasons To Turn On Multi-Factor Authentication
By: Nihad Hassan
November 6, 2020

Digital authentication is the process of identifying the identity of a user or a device against a computer system (e.g., a network, device, or application) to gain access to protected resources (data and sensitive applications). Digital authentication mechanisms are considered the backbone of information security in today’s digital age. In IT systems, a username and password remain the most used factor ...

The Rise Of The Virtual Conference. Reflections On Black Hat Asia
By: Daryl Sheppard
November 5, 2020

Without a doubt, this year has been a different one; and one that I doubt anyone would have anticipated come January 1. While unquestionably COVID has been terrible for the world, it has created a virtual conference. Rather than canceling major events that would have gathered thousands of people together in an unsustainable and unsafe environment, many events successfully pivoted ...

Threat Hunting Tools
By: Nihad Hassan
November 5, 2020

The active process of detecting abnormal activity within a computer network or system (e.g., server, workstation, mobile device, or IoT device) is called Cyber Threat Hunting. Discovered activities can be a sign of an ongoing attack (e.g., encrypting ransomware), exfiltration of data, command and control activity, or other malicious activity. Threat hunting is an active defense that works by proactively ...

Course Spotlight: Student Data Privacy Governance
By: Arun Vembanatt
November 4, 2020

Student Data Privacy Governance is one of the most discussed topics off-late. As you may be aware, the world has gone online due to the COVID pandemic, which has affected the entire planet. Especially for students, be it primary schooling or kindergarten, everything has become online, exposing their privacy. I should say that the Author Ivy Nelson has done a fantastic job selecting ...

Where To Get Cybersecurity Certifications
By: Shelby Welty
November 4, 2020

Right Place, Right Time: Where to Get Cyber Security Certifications When it comes to career potential, cybersecurity offers both expanding opportunities and increasing compensation. According to the U.S. Bureau of Labor Statistics, the average salary for infosec professionals now tops $99,000. The job market is predicted to grow at 31% through 2029, much faster than comparable industries. But landing cybersecurity jobs ...

What Is Cybersecurity Architecture
By: Nihad Hassan
November 3, 2020

Cybersecurity architecture, simply put, is a framework that defines the structure of an organization's cybersecurity posture, which includes consideration for its policies, standards, and business objectives. It accounts for the organization's computers, network devices, network interconnects, security capabilities, and the data that resides within the whole environment. The organization's foundational defense plan is considered to protect against cyber threats and ...

In A Complex World, Resiliency Protects
By: Corey Holzer, Ph.D. CISSP
November 3, 2020

In a Complex Cyber World Resiliency Protects In today's interconnected world, a business' network health is vital to the organization's health. In this information age, network failure means lost revenue and the potential for the business' failure. News outlets regularly report about breaches and stolen data at a faster pace than in the past. While the scope of a recent ...

Reverse Engineering: Everything You Need To Know
By: Prashant Sharma
November 2, 2020

Over the past hundreds of years, we have witnessed a drastic change in products and technology. Due to continuous advancement in technology, we have seen many products remain as relevant as they were years ago. However, the case is not the same for all the products. As time progresses, many products malfunction, and some even break down completely. We ...