0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Certificate Of Cloud Security Knowledge (CCSK) Course Review
By: Prasanna Peshkar
May 11, 2021

As companies move to the cloud, they require Information Security experts who are specialists in cloud security. The CCSK certificate is generally known as the measure of cloud security expertise and provides a comprehensive knowledge of how to secure data in the cloud. The Cloud Security Knowledge (CCSK) certificate from Cybrary prepares learners for the CCSK certification exam. This course ...

Sumo Logic Optimization Tip; Rule Tuning
By: Owen Dubiel
May 11, 2021

Keeping up with the latest attack trends and threat tactics can be challenging, not to mention the constant rule tuning involved with managing a SIEM solution. Wouldn't it be nice if there was a way to streamline rule tuning? Thanks to Sumo Logic, now there is. Sumo Logic has created a native way to set rule tuning, either on a ...

SAST vs DAST: A VS of the Security Tests
By: Staford Titus S
May 10, 2021

Prelude A crannied, "White Christmas" record crackling through the howling blizzard outside, a rundown fireplace proliferating its warmth, and a cup of hot chocolate topped with toasted marshmallows would be a perfect Christmas eve. Similar shades of bliss were evident at FireEye, where everything seemed fine and dandy until it wasn't. One seemingly benign alarm threw them on a wild ...

Cloud And Container Security With Orca
By: Owen Dubiel
May 10, 2021

Orca security offers one of the first agentless vulnerability scanners for both cloud and container assets. It has a unique ability to identify and classify different cloud threats in a digestible and actionable manner. This article will cover some of the high-level features that allow it to take action within your cloud environment quickly. Alerts Orca has three levels of ...

Bits and Bytes — The Benefits of Just-in-Time Cybersecurity Training
By: Cami Ragano
May 8, 2021

Time is not on the side of cybersecurity teams. As noted by CSO Online, 63% of companies said their data “was potentially compromised within the last 12 months due to a hardware- or silicon-level security breach,” and recent predictions suggest that in 2021, ransomware frequency will ramp up with a new attack happening every 11 seconds. As a result, it is ...

Introduction To Token Based Authentication
By: Nihad Hassan
May 7, 2021

As the world moves steadily to become fully digital, human dependence on technology increases rapidly. Nowadays, technology has infiltrated all aspects of our lives; people are using it to socialize, work, and study and shop, to name a few. To distinguish a user among millions of connected users online, authentication was invented to prove someone's digital identity. Digital authentication establishes confidence ...

Crowdstrike Zero Trust Power Partnership
By: Owen Dubiel
May 7, 2021

Zero-Trust is a buzzword that gets thrown around a lot in the security industry. There are a lot of companies claiming to offer an all-in-one solution to handle the topic of Zero-trust. Essentially, instead of "trust but verify," zero-trust is precisely what it sounds like, "trust nothing, authorize first." This article will discuss a partnership between four of the largest, ...

How To Create A Security Incident Response Plan
By: Nihad Hassan
May 7, 2021

The number of cyberattacks is escalating in both number and sophistication. As the world continues to move steadily to become fully digital, people's dependence on digital technology increases rapidly. As a result, criminals are riding the new digital wave and are shifting their operations to cyberspace. Global cybercrime damage is expected to cost the world $10.05 trillion annually by 2025. The ...

Introduction to Data Center Security
By: Nihad Hassan
May 5, 2021

Today's organizations of all sizes and across all industries are on different digital transformation roads. Digitalization has affected our life aspects; the most noticeable change was how enterprises do business and interact with customers. In today's digital age, most data is created digitally and never saved into paper. According to Statista, the total amount of data created, captured, copied, and ...

ITIL 4 Foundations Course Review
By: Prasanna Peshkar
May 5, 2021

Technology controls nearly every phase of today's markets, from an employee's job to services. When accurately managed, technology can be optimized to increase interaction, create facilities, and enhance productivity. Why is IT infrastructure critical? If an IT infrastructure is adaptable, strong, and secure, it can support a business to meet its goals and provide a business with a competing advantage in ...