0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Behind the Scenes: Endpoint Protection in the Cloud
By: purvikshah
June 7, 2019

This post originally appeared on "The Lockdown" , Thycotics Cyber Security Publication The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these ...

Office 365 phishing
By: purvikshah
May 31, 2019

Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on.It’s no wonder that email-hosting services like Office 365 have become so popular. Such cloud-based email services remove a lot of the ...

Get to Know Your Instructor: Gabrielle Hempel
By: SLWelty
May 21, 2019

onethird] [/onethird Fun Facts About Gabrielle! What course do you teach? Introduction to SIEM Tools What is an interesting fact about you? I’m 6’0” and the shortest in my family! Your favorite food? Sushi, ...

A Different View of Defense in Depth Applied
By: Deadshot
May 14, 2019

Defense in Depth is something everyone in security talks about. It is one of the first things a security professional will know and understand when they start down their journey to the dark side. Which, cyber security is the dark side of Information Technology. We are the professionals that say no to all the kids running around. Most ...

The Careful Art of Phishing Emails
By: dks11
May 14, 2019

While phishing has been around for a long time it still is something that each and every one of us experience in some way. To further this, its not going away either, only increasing as tools and skills get more and more advanced. To start I will share common tactics used in phishing emails, and then share ...

How to Survive the Password Apocalypse
By: purvikshah
May 10, 2019

The day has come – hackers’ have taken over every single password on the planet. For many, you may find yourself facing the end of the world as you know it. But before you panic, we have the essentials ready for you and your organization to survive. Your defense starts here. Get your password survival kit & free ...

Google Hacking Techniques for 2019
By: Tatianna
May 10, 2019

Google has been a powerful tool in the cybersecurity industry for a long time. Specialized searches can be used to gather information that is publicly available, but searches can also be used to compromise security systems. Many technologies, including web hosting, ...

Understanding SkyGoFree
By: cybergary
May 8, 2019

Remote Access Trojans, or RATs, have been a key part of the cybersecurity landscape for many years. These remote tools are covertly deployed on target devices. Once installed, the program allows extensive control and surveillance through the device. In a ...

Hacking Tools You Should Learn in 2019
By: CyberX
May 8, 2019

Let's start with an analogy:A carpenter with many years of experience goes to a house to perform a job. He knows the tools at his disposal. When he needs to shave the bottom of the cabinet, for example, he goes to the truck and gets a belt sander. In short, he is able to use a wide range of ...

Setting up a Cyber Security Program – A CISO’s Guide.
By: TONY
May 7, 2019

Have you just taken up the role of CISO in your organization? Are you charged with the responsibility of building or maintaining the cybersecurity program your institution? Quite frankly, I neither envy you or your role. Perhaps like @MattEastwood depicted in the picture below, the responsibilities you shoulder is likely to ensure you do not get that desired ...