0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


What should a workforce development platform include for MSSPs and security teams? The workforce is the single most important asset any organization will ever have. Logically, that means retaining and developing it should be a top priority. For Managed Security Services Providers (MSSPs), building and retaining a highly motivated and engaged workforce comes with unique challenges. Long hours, combined with the need ...


March Free Courses Launch Today! It's March...again. It comes every year, and it's usually by this time the "new year, new me" craze has completely worn off. There are so many aspects of life that have changed in last 12 months, but one thing we hope remains is dedicating time to develop your skills through training. As many resolutions become ...


What is Cisco DevNet? Cisco DevNet is a program for anyone who wants to learn, write, develop, and integrate code with Cisco technologies, APIs, and SDKs. The platform includes the Internet of Things (IoT), cloud, networking, data center, collaboration, analytics, automation software, security, open-source, mobility, and customer experience technologies. DevNet provides learning paths and tracks that include labs, sandbox environments, ...


Since the onset of the COVID-19 pandemic, the world has witnessed an accelerated shift towards adopting digital technologies in all work areas, and the healthcare sector was not an exception. IT role in supporting business operations has become vital in a society that is increasingly dependent on digital. Organizations in all industries are under tremendous pressure to digitalize their services ...


What is IMEI? IMEI stands for International Mobile Equipment Identity. It is a unique identifier, or serial number, which is linked to a smartphone (and mobile phones). It is usually 15 digits long and allows devices to be tracked and located should they be stolen or used in criminal activity. In other words, an IMEI number can let one’s device ...


Organizations and businesses spend resources protecting customer and/or employee personally identifiable information (PII). This mitigates risks associated with identity theft as well as protect the organization from fines and lawsuits. The evolution and popularity of cellular phones mean that a cell phone number is now considered PII. PII Background PII includes a broad category of information. The [Office ...


For many organizations in today's digital economy, protecting their data can be a matter of life or death. Data has become the lifeblood of enterprises in this information age. Most data is created digitally and never touches a physical medium (e.g., ink on paper). Digital data stored within an enterprise's IT – such as intellectual property, client data, financials, trade ...


Quantum computing (QC) is an up-and-coming technology and is widely considered the next monumental breakthrough in computing. It can potentially solve many of the most challenging and complex problems facing the world. Quantum computing can be extremely beneficial in many areas, such as space exploration, medical research, weather forecasting, climate change, artificial intelligence, traffic optimization, energy, finance, economics, and ...


Cybersecurity is a fast-growing field where one can earn their paycheck as early as possible once they are profoundly skilled. Most organizations will have a team to protect their data and resources (servers, computer systems, internal networks) from cyber attacks. Within cybersecurity, there are plenty of areas one can specialize in, such as cloud security, network security, forensics, web application ...


Cybersecurity threats are an urgent problem that most organizations struggle to handle. Recent statistics show an explosive increase in cyberattacks and data breaches, especially during the COVID-19 pandemic. Adopting the work-from-home model has weakened most organizations' security defenses because employees need to use their devices and home internet connections to remotely access corporate resources. A recent study by Varonis concluded that ...