0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybrary Partners With a US Military Branch To Build Custom Training Programs
By: Wesley Samuel III
June 25, 2020

Due to the COVID-19 pandemic, a US Military branch approached Cybrary in search of a partner to provide learning opportunities for its newly remote workforce to replace its in-classroom training. This US military group had a critical need for hands-on learning focused on networking, threat hunting, and cyber threat intelligence. This effort was to support the onboarding and development of their ...

Introduction to TLS 1.3
By: Vedant Jain
June 24, 2020

Introduction to TLSv-1.3 It's officially getting the Green Signal by the IETF (Internet Engineering Task Force), and it contains major improvements within the following three areas: Area of Privacy (Focused). Area of Performance. Area of Security. Let's look at each one. Unlike with TLSv-1.2, there appears to be some built-in motivation to upgrade, particularly with the Performance Booster, which in itself ...

Thycotic Extends PAM Cloud Leadership with Acquisition of Onion ID
By: Kali Linette
June 24, 2020

In June, we announced our Onion ID acquisition and added three new Access Controller solutions to our Privileged Access Management portfolio: Cloud Access Controller, Database Access Controller, and Remote Access Controller. These Access Controllers allow you to embed security controls within the four highest-risk layers of any modern organization’s infrastructure: Clouds, Data, and Devices. Clouds: We now empower CISOs to ...

How to Learn Information Technology Online
By: Karim Bakhsh Amiry
June 23, 2020

Capturing the attention of many individuals across the world, the vast field of Information Technology, or "IT" has grown into one of the most sought out majors. Whereas, not being able to put time into joining the IT learning centers is a challenge that many people face. Fortunately, we have information about a wide range of topics on the internet ...

"Simplify to Secure" Cybersecurity Report From Cisco Secure
By: Tom Condrasky
June 23, 2020

Having a difficult time balancing simplicity in security? You’re not alone. In our latest cybersecurity report, “Simplify to Secure,” we explore the consequences of stringing together point cybersecurity products and the complexity this can cause in your organization – along with the impacts on the effectiveness of the security ecosystem you’ve built. Quickly deploying a new technology without considering how it ...

Course Review: Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals
By: S.E. Williams
June 23, 2020

Overview Cybrary is currently offering an overview course of the Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals. That is a very long title with a lot of benefits to unpack! First, the course is geared towards anyone interested in using data analytics or machine learning to help manage cyber threats in a network. The Sumo Logic ...

DevSecOps: The Essential Guide For Fortifying The Software Development Life-cycle
By: Nadine Habaybeh
June 22, 2020

The rapid increase in the number and popularity of various development platforms has resulted in a substantial surge in cyber attacks. The conventional approach of initiating security testing at the later stages of software development is no longer feasible. From the very first stage and in each stage thereafter, security validations should be integrated into the development process to save ...

Navigating Conflict Resolution in Cybersecurity Leadership
By: Tatianna Harris
June 22, 2020

How great conflict resolution skills help cybersecurity leaders drive better results > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Conflict is the very essence of cybersecurity. With cyberattacks having the ...

What is the NIST cybersecurity framework, and why does it matter?
By: Charles Owen-Jackson
June 20, 2020

How alignment with the NIST cybersecurity framework can help protect your business Barely a week goes by without a major cybersecurity incident making the headlines. But it’s the countless incidents targeting smaller businesses and individuals that tend to go unnoticed by the public at large. For too long have businesses taken a primarily reactive approach to cybersecurity threats. A good example ...

How to Protect IT During COVID-19
By: Pankaj Kamboj
June 19, 2020

During COVID-19, cyberattacks have increased by over 40%. Common targets are hospital chains as REvil ransomware targets the unpatched VPN servers there! So what does it mean? Cyber attackers are not leaving any stone unturned, using all means to exploit the networks, and VPN is not exempt. With the sharp increase of VPN for home users, it becomes pertinent for ...