0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



In today’s world, many innovations come as an app. Banking, health & fitness, and e-commerce are some prevalent examples. Commonly, these apps adopt a modern system design created as a microservice or split the front and backend responsibilities. This type of coding practice employs more use and creation of Application Programming Interfaces (APIs). As these APIs are another input point ...


Cybersecurity, one of the most well-spoken, researched, and heavily invested domains in the IT industry, has had a tremendous impact on almost (if not all) every business, startup, company, the government that depends on software technologies to achieve their goal and objective. With the advent of AI and Machine Learning algorithms, they have inevitably attracted the interest of Cyber ...


Every day, hour, minute, and second, an attacker is trying to breach an organization's data. So, any organization needs to keep its Crown Jewels safe and away from any potential threats. I went through this course on Azure cloud storage accounts, by Jeff Brown, in Cybrary. This course's difficulty level is marked to the beginner level, so there is no ...


Cybersecurity professionals are in high demand, but as noted by a recent GovTech piece, even skilled cybersecurity staff don't always find the job they want. While part of the problem stems from expectation imbalances, some job seekers aren't willing to settle for anything less than their dream job in their current city. Other IT pros are struggling to secure interviews even ...


IT department teams use vulnerability scanners to discover vulnerabilities and other potential security issues within their networks, computer devices, applications, and other interconnected IT systems. Vulnerability scanners offer a unique insight for security teams to discover security vulnerabilities, measure the risk weight for each vulnerability, and suggest remediation recommendations for them. A vulnerability scan can run from an internal or ...


In today’s information age, enterprises are heavily dependent on IT systems to do their work. Any sudden outage in IT systems can result in substantial financial and reputation losses to the affected party. A disaster recovery plan (DRP) is a road map that lists needed tools, procedures, and policies that an organization should implement if a sudden failure occurs to ...


Artificial Intelligence is one of the hottest topics today, but what are the best programming languages to learn for those interested in AI? Aside from the math necessary to design the algorithm, some programming languages are used in the Artificial Intelligence area. Python When we talk about Artificial Intelligence, the language one must know is Python. The huge number of ...


WHAT IS CLOUD STORAGE? Cloud storage is a remote network that uses a multi-tenant, highly virtualized infrastructure to provide flexible storage facilities for companies that can be dynamically provisioned as required by the enterprise. A large variety of cloud storage services offer this service. Predominantly, IT departments handling infrastructure-strained data centers would "throw boxes at the problem," which meant constantly adding ...


History of Cloud Computing Over the past decade, cloud computing has been one of the mainframe technologies contributing to automation and data storage. The sudden hype about this technology came into existence when Amazon launched its first computing service AWS-Elastic Compute Cloud, in late 2006. Amazon Web Services (AWS), the sole proprietor of cloud, was extremely popularized among the emerging ...


WHAT IS A SECURITY BREACH? In cybersecurity, a security breach is a successful attempt by an attacker to gain unauthorized access to an organization's computer systems bypassing the security mechanisms. Breaches may lead to theft of sensitive data, corruption or sabotage of data or IT systems, or actions intended to deface websites or damage reputation. Some countries have laws exposing the ...