0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The AES Block Cipher: Advanced Encryption Standard
By: Md. Abrar Jahin
September 25, 2020

Advanced Encryption Standard (AES) is a block cipher designed with some inherent flexibility. It can use three possible block sizes of b=128, 192, or 256 bits, and can use three possible key lengths n=128, 192, or 256 bits. The diagram below describes the smallest variant with b=128 and n=128. A key length n=128 was considered to be secure against brute ...

Why Is It Important to Have Employee Training
By: Ravi Raj
September 25, 2020

It is typical that companies hire people based on the skills that they possess. But still, there is a lot that a new hire or an existing employee needs to learn and train themselves to align with the work culture and adhere to a company's values and standards. Besides, they need to be trained about the company policies to ensure ...

CISM Requirements
By: Doug Bonderud
September 24, 2020

Embracing the Infosec Imperative? Consider CISM Infosec remains a top priority for organizations as both data volumes and attack vectors expand. Tech Republic noted 89% of companies now point to widespread threats such as phishing and ransomware as their biggest security issues. In comparison, 53% said problems with unpatched systems are paving the way for potential attacks. The result? There's no ...

Understanding the enterprise sales process and its role in cybersecurity innovation
By: Dr. Edward Amoroso
September 23, 2020

Every business needs improved cybersecurity, but that doesn’t mean it’s something that sells itself. In fact, many businesses see cybersecurity as a cost center rather than an investment. Security leaders themselves often have a hard time communicating the benefits of improved cybersecurity from a business perspective. For cybersecurity practitioners, the sales process might seem ancillary to their roles, or even ...

DevSecOps Pipeline: Deployment
By: Philip Kulp
September 23, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the sixth in a series covering core principles to assist in the automation of a secure pipeline. Securing the Development Cycle What Are We Defending? [Pipeline: ...

Infographic: Cybersecurity Skills Gap Research Stats Uncover Real Issues
September 22, 2020

Today Cybrary is releasing the complete findings from our “Cybrary Skills Gap Research Survey and Report,” studying the challenges, perceptions, and impacts of the cybersecurity skills gap faced by security teams worldwide. In addition to our comprehensive survey report, we produced the below infographic to highlight some of the most significant findings from the study. Feel free to share ...

How to Get Started with Cloud Security
By: Vivek Soni
September 21, 2020

What is Cloud Computing? Cloud computing is the delivery of on-demand computing services over the internet or dedicated network. Its infrastructure is a pool of hardware or software elements like servers, data storage, software, networking, etc. It offers a lot of advantages, including but not limited to: Cost-saving: As storage, processing capability, etc. are outsourced, which benefits the business by ...

Top 10 OSINT Tools
By: Nihad Hassan
September 21, 2020

A few decades ago, gathering intelligence about your target required sophisticated techniques and large budgets. Nowadays, one can achieve the same result by just having a computer and an internet connection. In today's information age, people became more dependent on computing technology and the internet in their daily lives. For instance, people are using the internet to communicate with each other, ...

How Will AI/ML Strengthen Cybersecurity & Prevent Breaches?
By: Shifa Martin
September 18, 2020

How Will AI/ML Strengthen Cybersecurity & Prevent Breaches? Tales of crippling security breaches are not new. Despite the warnings and exposure that these issues receive, companies seem indifferent, and compromises are on the rise. Within the last ten years, there have been 300 data breach incidents that include the theft of more than 100,000 records. Here are some data breach statistics ...

Attack Surfaces vs. Vulnerabilities
By: Makeia Jackson
September 18, 2020

By now, we can assume that there is no such thing as foolproof security. The only way to fail-safe a network is to unplug it. Where there is technology or IoT, we can assume vulnerabilities may be present. For an organization to maintain a secure and resilient environment, it must focus on implementing and practicing good "cyber hygiene." Below are a ...