0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Windows Security Fundamentals In A Corporate Environment
By: Shimon Brathwaite
March 11, 2022

windows header Windows is one of the most commonly used operating systems on the planet, with as much as 65% of laptops users in the United States and 77% of users globally owning a windows machine. Regardless of which company you work for, there is a good chance that someone at your company will have windows installed on their computer. Because ...

Cyberwarfare: Evolution & Impact on the Russia-Ukraine Conflict
By: Cybrary Staff
March 10, 2022

What Can Cyber Practitioners Do in the United States to Prepare? Today, our world is more connected through technological infrastructure that has revolutionized the way in which individuals, organizations, and governments carry out their day-to-day activities. While this evolution has enhanced our lives economically and socially, it has also altered the definition of warfare. Russia has been employing cyber tactics ...

8 Leadership Skills Every Cybersecurity Professional Must Have
By: Nihad Hassan
March 8, 2022

Cybersecurity has become a big concern for organizations worldwide. The accelerated shift to cloud solutions, the increased number of IoT devices, and the expansion of supply chain networks have increased organizations' cyberattack surface and made them vulnerable to different cyber threats. Nowadays, most organizations have their security teams to respond to their needs, while the small ones outsource their IT ...

Communicating Security Effectively To Executive Management
By: Elviraluke Napwora
March 7, 2022

With the increased growth in information security incidents and technology risk management, the need to engage the non-IT executive team in this conversation is becoming increasingly important. Cybersecurity is an organizational effort, and the various stakeholders involved need to understand the role they can play in protecting the business; for the executive team, their buy-in to the security solutions presented ...

What Makes A Cross-Functional Incident Response Team Effective?
By: Shimon Brathwaite
March 4, 2022

A cross-functional team/multidisciplinary team consists of people with different functional expertise who work together for a common objective. This is a very important aspect of having a balanced incident response team. As a hiring manager, you must budget wisely and hire people with the proper skill sets. Otherwise, your ability to perform investigations and resolve security incidents will become more ...

Enterprise Project Management: Elements, Implementation, Methodologies and Benefits
By: Divya Bora
March 3, 2022

eM header Enterprise Project Management(EPM) is the disciplined practice of managing projects simultaneously on an organizational level. It comprises implementing processes and strategies to streamline and enhance project management effectiveness on a large scale. Enterprise project management is a course designed to make readers deeply understand it. ESSENTIAL ELEMENTS OF EPM Enterprise project management comprises the following seven elements: elements of EPM __1. Risk ...

Top Seven Cybersecurity Soft Skills Interview Questions
By: Nihad Hassan
March 2, 2022

When hiring IT security professionals, recruiting managers are looking to find the best of the best. Most people, including those transiting into cybersecurity roles, think that having technical expertise (hard skills) is the main requirement for the cybersecurity profession; however, this is inaccurate. For instance, hard skills, such as familiarity with attack and defense techniques and tools and knowing how ...

Incident Response, Procedures, Forensics (Hands-on training)
By: Cybrary Staff
March 1, 2022

An introduction to incident response procedures and forensics Digital forensics and incident response play a vital role in business policy and law enforcement operations to remediate attacks and reduce risk. Summary: Enterprises depend on incident response and digital forensics to ensure that their mission-critical technology is sufficiently secure. These processes often incorporate red and blue teaming to test an organization’s existing ...

How To Communicate With Technical And Non-Technical Cybersecurity Clients
By: Shimon Brathwaite
February 28, 2022

As a cybersecurity professional, you will deal with many different people in day-to-day business. Technical clients mean someone with a lot of knowledge on how computers and information systems work. Non-technical clients represent employees that are more focused on the business side and don’t have a wrong understanding of computers and information systems. Your job requires you to communicate with ...

Five Critical API Security Vulnerabilities
By: Ambler Jackson
February 25, 2022

Application Programming Interfaces (APIs) are a fundamental part of modern software development. Organizations use APIs to enhance the user experience for their products and services. Almost every application uses an API. While APIs are valuable and necessary for any digital transformation strategy, they are also high-value targets for bad actors seeking to take over accounts, create fake accounts, or engage ...