Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Network Firewall Security With Titania’s Nipper
By: Owen Dubiel
May 12, 2021

Network firewall security can be a challenging endeavor to achieve. Many pitfalls can occur, and it usually requires the approval/coordination of multiple parties to implement or even get consent to implement effectively. Today, we will cover a secret, a low-key tool that is non-intrusive, easy to use, and satisfies all parties involved. Whether you are trying to achieve higher security ...

How To Get Certified As An AWS Solutions Architect
By: Vijay Maripi
May 12, 2021

Most of the world's organizations now operate part of their computing environments in the Amazon Web Services (AWS) cloud. More organizations are integrating AWS to run and maintain their services every day. That's why gaining an AWS certification can be a good investment when looking for a new IT career, changing to your current company's unique role, or wanting to ...

Certificate Of Cloud Security Knowledge (CCSK) Course Review
By: Prasanna Peshkar
May 11, 2021

As companies move to the cloud, they require Information Security experts who are specialists in cloud security. The CCSK certificate is generally known as the measure of cloud security expertise and provides a comprehensive knowledge of how to secure data in the cloud. The Cloud Security Knowledge (CCSK) certificate from Cybrary prepares learners for the CCSK certification exam. This course ...

Sumo Logic Optimization Tip; Rule Tuning
By: Owen Dubiel
May 11, 2021

Keeping up with the latest attack trends and threat tactics can be challenging, not to mention the constant rule tuning involved with managing a SIEM solution. Wouldn't it be nice if there was a way to streamline rule tuning? Thanks to Sumo Logic, now there is. Sumo Logic has created a native way to set rule tuning, either on a ...

SAST vs DAST: A VS of the Security Tests
By: Staford Titus S
May 10, 2021

Prelude A crannied, "White Christmas" record crackling through the howling blizzard outside, a rundown fireplace proliferating its warmth, and a cup of hot chocolate topped with toasted marshmallows would be a perfect Christmas eve. Similar shades of bliss were evident at FireEye, where everything seemed fine and dandy until it wasn't. One seemingly benign alarm threw them on a wild ...

Cloud And Container Security With Orca
By: Owen Dubiel
May 10, 2021

Orca security offers one of the first agentless vulnerability scanners for both cloud and container assets. It has a unique ability to identify and classify different cloud threats in a digestible and actionable manner. This article will cover some of the high-level features that allow it to take action within your cloud environment quickly. Alerts Orca has three levels of ...

Bits and Bytes — The Benefits of Just-in-Time Cybersecurity Training
By: Cami Ragano
May 8, 2021

Time is not on the side of cybersecurity teams. As noted by CSO Online, 63% of companies said their data “was potentially compromised within the last 12 months due to a hardware- or silicon-level security breach,” and recent predictions suggest that in 2021, ransomware frequency will ramp up with a new attack happening every 11 seconds. As a result, it is ...

Introduction To Token Based Authentication
By: Nihad Hassan
May 7, 2021

As the world moves steadily to become fully digital, human dependence on technology increases rapidly. Nowadays, technology has infiltrated all aspects of our lives; people are using it to socialize, work, and study and shop, to name a few. To distinguish a user among millions of connected users online, authentication was invented to prove someone's digital identity. Digital authentication establishes confidence ...

Crowdstrike Zero Trust Power Partnership
By: Owen Dubiel
May 7, 2021

Zero-Trust is a buzzword that gets thrown around a lot in the security industry. There are a lot of companies claiming to offer an all-in-one solution to handle the topic of Zero-trust. Essentially, instead of "trust but verify," zero-trust is precisely what it sounds like, "trust nothing, authorize first." This article will discuss a partnership between four of the largest, ...

How To Create A Security Incident Response Plan
By: Nihad Hassan
May 7, 2021

The number of cyberattacks is escalating in both number and sophistication. As the world continues to move steadily to become fully digital, people's dependence on digital technology increases rapidly. As a result, criminals are riding the new digital wave and are shifting their operations to cyberspace. Global cybercrime damage is expected to cost the world $10.05 trillion annually by 2025. The ...