Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CyberSecurity Quick Guide for Students
By: Solene Gabellec
October 25, 2019

This blog was originally posted on Knogin blog by author Anna Codina. Reposted with permission. (By the way! If you'd like to keep a hard copy of this guide, you can also download the Ultimate Cybersecurity Quick Guide for Students for ease of use.)   Different Ways You Could be Compromised ...

Our World in Transition and Our Future Demands
By: SLWelty
October 23, 2019

This blog was originally posted on Cisco Security Blog by author John Stewart. Reposted with permission. October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of ...

Practical Security: A Story About Patch Management
By: David Balaban
October 20, 2019

Probably, all SOC (security operations center) analysts are dreaming of seeing their detecting rules identify and block the sophisticated techniques of pro-government APT groups, and investigations lead to the discovery of exploits that use zero-day vulnerabilities. Start FREE Virtualization Management Course >> Unfortunately (or fortunately), the majority of incidents are much less romantic: ...

5 Useful Methods of Using a Double TCP-to-Reverse-SSH Tunnel
By: Chang Tan Lister
October 16, 2019

Throughout the day, I had some infuriating internet outages that forced me to create persistent ssh tunnels with autossh (Linux only), so I can get my tunneled connection back when Cox goes back up. We are covering 5 different ways to use a double TCP-to-Reverse-SSH tunnel productively:   Remote Access To A Linux Machine at Home ...

Burnout is Real: Lets Talk About it
By: CatPhish_Billy
October 14, 2019

You can feel it in your bones, the little voice in the back of your head is especially loud today. Self-doubt begins to rear its ugly head, the impostor syndrome is vigilant today, and all you want is some peace.This, my friends, is what is called burnout. It is a real condition that can cause both physical and mental ...

PCI Security Compliance Challenges and Best Practices
By: Rebecca Beris
October 7, 2019

Today’s economy is a digital one, and a big part of that is thanks to the emergence of credit and debit cards. We may not yet be an entirely cashless society, but try to book a concert ticket in advance or order a product from the other side of the world. It will soon become apparent how much we ...

EPP vs EDR: What's the Difference and Why You May Need Both
By: eddiesegal
September 24, 2019

An endpoint is one end of a communication channel. For example, when one system communicates with another, the point of communication occurs on both endpoints. Endpoints are a gateway into a network or an application. Consequently, they are one of the most vulnerable elements in an application’s architecture, and bad actors commonly use them as an entry point to launch ...

SC Reboot Leadership Award Winner
By: jasminen
September 23, 2019

CYBRARY RECOGNIZED IN SC MEDIA REBOOT LEADERSHIP AWARDS MASTER INSTRUCTOR KEN UNDERHILL WINS OUTSTANDING EDUCATORS LEADERSHIP AWARD FOR HIS DEDICATION TO TRAINING OVER ONE MILLION SECURITY PROFESSIONALS COLLEGE PARK, Md. – September 23, 2019 – Ken Underhill, Master Instructor at Cybrary , has been named a winner in the third-annual SC Media Reboot Leadership Awards, ...

Bluetooth - Another Backdoor for Hackers to Break into our Privacy
By: Phil Abraham
September 10, 2019

Do you know how old Bluetooth connectivity is?Almost 2 decades; do you think this 20-year old wireless capability become old school?No, not at all! Enroll in FREE Crackle Course >> A big thanks to the growth of IoT that positioned Bluetooth into new environments – beyond consumer-facing applications- such as smart buildings, ...

Building a Risk-Based Cybersecurity Architecture
By: SLWelty
August 28, 2019

Blog authored by Christopher J. Hodson I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus far, providing students across the globe with a few insights from my time in the field working as a CISO, architect, designer, and systems engineer. Many of you have asked me about my book, Cyber ...