0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Are The Best Cybersecurity Certifications
By: Shelby Welty
October 23, 2020

What are the Best Cybersecurity Certifications? Cybersecurity is a hot topic. Increasing attack pressure combined with a growing skills gap puts many companies in a difficult position as they look to find best-fit candidates with the right set of hard and soft skills — and the talent and drive to solve infosec problems combined with recognizable, reputable cybersecurity certifications. But which ...

An Introduction to Azure Arc
By: Matt Choi
October 23, 2020

What Azure Arc means for enterprises with distributed computing environments The rapid evolution of cloud technologies has left many enterprises struggling to keep up. The need to constantly reskill staff and get them up to speed with new systems and processes is perhaps one of the biggest challenges today’s business leaders face. And things aren’t getting any easier. While the benefits ...

How To Know If You've Been Hacked And What To Do About It
By: Sunny Verma
October 22, 2020

Cyberspace is a dangerous place. Behind all those ‘helpful’ websites which promise to provide the users with ‘free’ stuff, there are internet-predators who are either after an unsuspecting target’s PII (Personally Identifiable Information) or after the computer resources they possess. Security experts agree that the random link an unsuspecting person got from a stranger on an internet forum will provide ...

The Best Certifications for CyberSecurity Jobs
By: Garrett Wilson
October 21, 2020

Breaking it Down: The Best Certifications for Cybersecurity Jobs You’re looking for a cybersecurity job. You’re in luck — information security professionals are now in high demand as companies move to shore up existing security controls, build better infrastructure, and develop policies and procedures that help future-proof key systems against attack. To help meet their cybersecurity goals, organizations are seeking the ...

New Course "COBIT Foundations" Summary
By: Adhirath Kapoor
October 21, 2020

Information Technology is essential to every industry that exists in today's era. In itself, IT is a vast domain that needs to be incorporated with the associated industry in a very diligent manner. An important term that comes into play after successful incorporation is "IT Governance." It makes sure that the IT Departments are ready for any challenges thrown ...

"Cyber Network Security" Course Overview
By: Luis Carrillo
October 20, 2020

Data could be considered the most valuable asset both in our personal lives and in business. For this reason, data is highly susceptible to security attacks. The more data you store online, the more you and your business are at risk – almost no one is safe from cybersecurity threats. A hacker attack occurs every 39 seconds, affecting one in three ...

Is IoT Easy to Learn?
By: Michael Cunningham
October 20, 2020

The short, concise, and straightforward answer is "Yes" if one starts with the basics and builds a solid foundation. You are not trying to make a rocket to go to the moon. Now let us get into the fuller story. One of the first considerations is the extent of one's knowledge base. Are you a hobbyist radio repair tech? What ...

Cybersecurity Of The Internet Of Drones
By: Muhammad Bilal
October 19, 2020

There is a modern trend edging towards development in Unmanned Aerial Vehicles (UAVs). UAVs have supported various opportunities and opened paths at an effective cost in the development of technology. UAVs can be considered one of the best solutions in many surveillance areas, such as research, medical, agricultural, and transportation, due to the capability of dynamic reconfigurability, fast response, and ...

7 Pressing Questions and Answers about Cybersecurity Leadership in the Modern Era
By: Shelby Welty
October 16, 2020

Of all the executive positions in the enterprise, few have evolved as quickly as the role of the CISO. Traditionally, a CISO’s role focused on technical tasks, an approach that was sufficient in the past given the less complex and relatively slow-moving nature of cyberthreats. Today, it is a very different picture, where cyber risk is everywhere, and technology is ...

Course Summary: NIST Privacy Framework
By: S.E. Williams
October 16, 2020

Overview of the NIST Privacy Framework The data-processing ecosystem of business environments is often highly complex and dynamic, with ever-changing interconnected relationships (Green, 2020). In such environments, every role, depending on its responsibilities, may use privacy-related data for varying outcomes. Implementing the NIST Privacy Framework gives an organization a method to better manage all its systems, controls, and ...