0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Top Four GRC (Governance Risk Management and Compliance Software) Tools
By: Nihad Hassan
April 6, 2021

As the world moves steadily to adopt digital technologies in all life aspects, the need for various regulations to govern the storage, processing, and transfer of people's data becomes increasingly important. The ongoing spread of coronavirus disease has forced most organizations to adopt the remote work model. In this new working scenario, employees access corporate resources remotely using personal computing ...

Free Network Mapping Software
By: Nihad Hassan
April 6, 2021

As the digital transformation revolution moves steadily to occupy all life aspects, human dependence on technology increases. Technology becomes an integral part of everyday life. We know we are using technology whenever we use a mobile phone, a laptop, a tablet, or other computing devices to work, to study, to socialize, to shop and for entertainment, and online communications. ...

What Is A Vulnerability Assessment?
By: Gabriel Schram
April 5, 2021

An underlying cause of breaches and exploits is improper or lack of vulnerability testing. A vulnerability can be broadly described as a weakness in a system, operational process, or design that a threat can exploit. Testing for vulnerabilities is an important component of proactive cybersecurity and system hardening. A vulnerability assessment is a review and evaluation that tests a ...

Crowdstrike RTR Optimization
By: Owen Dubiel
April 5, 2021

Crowdstrike has taken significant steps in the industry to proclaim itself as one of the top contenders for Endpoint Detection and Response. Many Crowdstrike customers can detect, isolate, contain, troubleshoot, and remediate 90% of incidents within minutes, but many are unaware of exactly how to accomplish this. This article will dive into the full capabilities of Crowdstrike’s RTR (Real-Time Response) ...

Privacy Issues With AI As They Intertwine In Our Lives Deeper Everyday
By: Prasanna Peshkar
April 2, 2021

As more companies are adopting Artificial Intelligence (AI) as a core component of their digital transformation, there is a demand for panels to concentrate on the risks associated with AI's handling of personal data and the possible preference and unpredictability of its output. AI has been in the world of IT for a while; yet, over the past few years, ...

Announcing Cybrary's Free Certification Courses Available Through April 30th
By: Garrett Wilson
April 2, 2021

Cybrary's April free courses are now open for enrollments to all users. Certifications are a critical part of achievement and proof of knowledge and skills in cyber today. So here are 6 certification courses free to everyone through April 30, 2021. Systems Security Certified Professional (SSCP) AZ-103 Microsoft Azure Administrator AWS Certified Cloud Practitioner Cisco Certified Network Associate (CCNA) ...

Burp Suite Tutorial Part 2: Essential Shortcuts in Burp Suite Proxy for More Productivity
By: payloadartist
April 1, 2021

Enhancing Productivity with Burp Suite Shortcuts Improving skills in Burp Suite can prove incredibly helpful while testing web applications and becoming a better pentester. Particularly, while testing larger web applications, using the right hotkeys in Burp Suite can be a great way to optimize manual application security audits. Not just penetration testers, bug bounty hunters too can hugely benefit by ...

Best SIEM Tools in 2021
By: Nihad Hassan
April 1, 2021

The widespread adoption of digital technology has shifted a significant volume of crimes from the physical world into cyberspace. Cyberattacks are increasing in sophistication and numbers. Worldwide cybercrime cost is projected to be $10.05 billion annually by 2025. The estimated losses of cybercrime have been reflected worldwide by increasing spending on security solutions significantly. According to [International Data Corporation (IDC) ...

Cloud Security Policy Fundamentals
By: Nihad Hassan
March 31, 2021

The ongoing spread of coronavirus has forced many companies to change their operating philosophies. The most notable change was in the massive shift from employees working on-site to a remote workforce model. With the increased number of people (both employees and clients) accessing IT systems remotely, the large-scale adoption of cloud technologies has become necessary for businesses. Cloud technology brings ...

How To Become A Program Manager
By: Shelby Welty
March 31, 2021

The Program Manager career path prepares students for a management-level role in an organization's IT department. Students on this path will learn how to lead, coordinate, integrate, and be accountable for the success of an organizational program while maintaining alignment with the company's priorities or enterprise. The program manager career path will help students develop a core technical program leadership ...