0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


As the digital transformation moves steadily to occupy all life aspects, people's dependence on digital technology to facilitate their daily lives increases. Not all organizations can afford the costs of adopting digital solutions to support all their work operations. For instance, digitizing all work processes will require hardware and software tools in addition to expertise (e.g., technical support costs). This ...


The IT project manager role requires qualified professionals to supervise IT projects and teams to make sure that projects meet time and budgetary guidelines. On this career path, students will learn how to perform key project management tasks and techniques that will allow them to seek management roles within the IT industry. Cybrary's expert instructors and virtual labs provide students ...


As the world becomes increasingly digital, organizations' technology adoption continues to increase at a rapid pace. The world has significantly shifted towards adopting IT in all aspects of life, such as work, study, shopping, entertainment, and social life, since the start of the COVID-19 pandemic. To stop the spread of the disease, governments worldwide imposed physical distancing measures and ...


Cryptography uses security protocols to conceal the true meaning of users’ communications from potential adversaries or malicious actors. This is often done through encryption. Encryption is the process of converting plaintext data into ciphertext. Encryption is vital to the protection of data at rest or in use. This conversion is often directed using an algorithm. Algorithms act as sets of ...


Implementing a HIPAA compliance program is necessary to ensure that the company is loyal to all rules and laws set out in the HIPAA Privacy and Security Rules. A robust HIPAA compliance program is vital to assure that all sensitive documents, particularly medical data, are safe and appropriately secured from security breaches. This Implementing a HIPAA Compliance Program course from ...


Quantum computing is one of the new technology advancements of the 21st century that has a lot of potential for creative destruction. Quantum computing uses quantum bits rather than regular bits; this allows it to process things much faster than a regular computer. This new technology can have applications in many different areas, and one of them is Cybersecurity. One ...


As society moves steadily to become completely digital, cybercriminals moved with the wave and shifted their activities to cyberspace. The ongoing spread of COVID-19 has forced most organizations worldwide to adopt the work-from-home model. In this new scenario, employees have to access their corporate resources remotely using personal computing devices considered less secure than their work counterparts. This created a ...


Becoming a Database Administrator is a rewarding but challenging career path that offers many benefits in a growing IT field. Database Administrators manage systems that utilize, protect, query, and provide the secure storage of important organizational data. At Cybrary, students will have access to our virtual lab for hands-on experience. Courses are taught by knowledgeable instructors who are experts in ...


As the world moves steadily to adopt digital technologies in all life aspects, the need for various regulations to govern the storage, processing, and transfer of people's data becomes increasingly important. The ongoing spread of coronavirus disease has forced most organizations to adopt the remote work model. In this new working scenario, employees access corporate resources remotely using personal computing ...


As the digital transformation revolution moves steadily to occupy all life aspects, human dependence on technology increases. Technology becomes an integral part of everyday life. We know we are using technology whenever we use a mobile phone, a laptop, a tablet, or other computing devices to work, to study, to socialize, to shop and for entertainment, and online communications. ...