0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Why Learn DevOps
By: Jitendra Singh
April 3, 2020

DevOps is a set of practices or processes that combines software development and information technology operations. It is becoming popular because it enables businesses to achieve mainly two objectives; decrease systems development life cycle time and provide continuous product delivery with high quality. Increasing the pace of software delivery is not possible with traditional software development methodology as the methods ...

Toll Ransomware Attack - The Dark Side of Encryption
By: Anthony Canning
April 3, 2020

Who is Toll and what happened? On the 31st of January 2020, Toll, an Australian based, internationally operating shipping and logistics company was the subject of a targeted ransomware attack. In response, the company shut down as many as one thousand infected servers, which effectively crippled its IT infrastructure and brought logistics operations to all but a standstill. The company ...

The Role of Emotional Intelligence in Life and Security Teams
By: Mark Nibert
April 2, 2020

What is Emotional Intelligence? Emotional intelligence is the ability to recognize and identify your own emotions, understanding the feelings of others, and using your ability to manage emotions to work within both realms. One of the critical aspects of being a leader, mentor, or even a teammate is the ability to understand others. As a leader, it means understanding how ...

Ethical Leadership: How to Think and Respond
By: Duane Clouse
April 2, 2020

Ethical Leadership, where to begin? As a leader, or someone looking to be a leader, you are probably thinking to yourself, how do I build and maintain a strong ethical foundation in my job and continue down an ethical path that is effective and trusted both inside and outside of my professional and personal life. In ...

How to Learn Cybersecurity From Scratch
By: Devansh Agarwal
April 2, 2020

As a student like most of you, I have just joined my first job as a penetration tester. Today, we will discuss the stepping stones to obtain a profession in cybersecurity. Most of the suggestions I will provide are based on what I and my fellow mates have experienced. What is better for a fresh beginner to learn from the ...

How Cloud Knowledge Gets You a Job
By: Doug Bonderud
April 1, 2020

It’s no exaggeration to say that cloud computing has fundamentally changed the IT landscape. Once a technology outlier, this distributed deployment model is now critical for companies to drive agility and adaptability at scale. Investment reflects growing this interest: As noted by Tech Crunch, revenue from the cloud infrastructure market alone passed $30 billion in the fourth quarter of 2019,and ...

The Shift to a Remote Workforce and Keeping it Cyber Secure
By: Thycotic
March 27, 2020

Cyber Security Teams Quick Guide to working Remotely and Securely-large (1) As employees are packing up their office equipment and shifting to working remotely, they are facing serious risks and exposure to cybercriminals wanting to take advantage of these increased opportunities. A well-executed transition will make working from home possible and maintain security, and it will do so within the limitations ...

A CISO's Guide to WFH Security
By: Mike Gruen, CISO at Cybrary
March 18, 2020

As more and more companies are planning, and now executing, their emergency remote workforce strategies, we see an influx of articles with helpful WFH tips to stay productive. Here today, we are filling in some gaps other articles seemed to overlook. This short list of Dos and Don'ts geared for IT and Security teams will provide some helpful insights; however, ...

"Advanced Evimetry Forensic Acquisition: Dongle-less, Cloud, and Persistent Cloud" Course Review
By: Richard Beyer
March 11, 2020

With the prevalence of virtualization and cloud computing making major bounds in recent years, the old ways of forensic data acquisition are fading into oblivion. Not only are the storage device capacities increasing by orders of magnitude, but they are also often inaccessible within a data center halfway around the world. Simply removing the drive to connect a write-blocker, or ...

Guide Your Cyber Security Team to Success with Thycotic’s Next Webinar
By:
March 4, 2020

Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather. Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s responsibility—including the ...