0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



It's that time again... This month's free courses focus on growth and development. Here is the November lineup of free courses. You saw our "spooktacular" special courses that were free in October, and now we're coming at you with a whole new set for November! We’ve made 7 courses (that are normally paid!) FREE for the entire month of ...


Navigating privacy and regulatory challenges in the age of the cloud Our increasing reliance on data, coupled with the evolving cyberthreat landscape, has given rise to the need for new regulations and other safeguards for protecting information. In the western world, the overarching trend has been to give consumers greater control over their data, including who collects it, how, and ...


Ever since healthcare services integrated technology and the landscape of information flow changed, the industry has been tasked with addressing portability, accessibility, and patient data security. To understand the implications of confidentiality and privacy in smart and connected health, it is worthwhile to understand why hospitals and healthcare institutions are such a profitable target for cyber-attacks. The primary reason is ...


Critical Compensation: The Top Paying Cybersecurity Certifications Money matters. While cybersecurity professionals often enter the field with passion and pursue long-term infosec careers because they care about helping companies protect digital data assets, interest alone doesn't buy groceries or keep the lights on. So it's no surprise that security professionals often find themselves wondering which certifications help secure the best compensation ...


Cyber Threat Intelligence (CTI) is still considered a relatively new field in cybersecurity; however, the practice of intelligence is regarded as an old and mature discipline. There are multiple definitions of intelligence; however, the essence of intelligence is collecting information to support the decision-making process. According to the UK National Crime Agency (NCA): “Intelligence is information that is received or collected ...


For cybersecurity projects to be successful, IT and security professionals should implement strict project management practices. Having project management skills is essential for the project management team to accomplish their responsibilities. For instance, such skills enable them to have their projects run smoothly, stay within budget, and delivered within the agreed timeframe. Following solid project management practices gives numerous benefits ...


Linux is an open-source operating system that is widely used in enterprises these days. It has many distributions such as Mint, Ubuntu, Kali. One of the most popular distributions of Linux OS is called Kali, which is widely used among penetration testers. Kali Linux has tons of free, open-source built-in tools that are awesome and used for penetration testing. These ...


What are the Best Cybersecurity Certifications? Cybersecurity is a hot topic. Increasing attack pressure combined with a growing skills gap puts many companies in a difficult position as they look to find best-fit candidates with the right set of hard and soft skills — and the talent and drive to solve infosec problems combined with recognizable, reputable cybersecurity certifications. But which ...


What Azure Arc means for enterprises with distributed computing environments The rapid evolution of cloud technologies has left many enterprises struggling to keep up. The need to constantly reskill staff and get them up to speed with new systems and processes is perhaps one of the biggest challenges today’s business leaders face. And things aren’t getting any easier. While the benefits ...


Cyberspace is a dangerous place. Behind all those ‘helpful’ websites which promise to provide the users with ‘free’ stuff, there are internet-predators who are either after an unsuspecting target’s PII (Personally Identifiable Information) or after the computer resources they possess. Security experts agree that the random link an unsuspecting person got from a stranger on an internet forum will provide ...