0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Learn Network Operational Management
By: Casey Gager
July 30, 2020

Cybersecurity is a diverse and growing field. There are many paths a professional may take to becoming a cybersecurity expert. Also, there are distinct practice areas within the world of cybersecurity. One person may be an expert in technical aspects of cybersecurity, while another person's specialty may focus on compliance. Regardless of the cybersecurity professional's role, understanding how information technology ...

Top Cyber Threats in 2020
By: Divya Bora
July 30, 2020

What is a cyber-threat? You have probably heard the term cyber threat, as it is being used nowadays due to increased reliance on technology, but what does it actually mean? Cyber-threat refers to a malicious act that seeks to damage data, steal data, or disrupt digital life in general; such as computer viruses, data breaches, Denial of Service (DoS) attacks, or ...

Implementing Data Protection by Design
By: Dr. Edward Amoroso
July 30, 2020

Optimizing prevention, detection, and response in the cybersecurity challenges of tomorrow Data protection used to be relatively easy. Traditional firewalls would keep most of the external threats from getting into the company network, while antivirus software installed on endpoints would usually take care of those which did make it through. Additional layers of security, such as intrusion detection and prevention ...

How Can We Use AI In Cybersecurity To Detect Threats And Exploits
By: Manik
July 29, 2020

For years, we have dreamed of the moment that we see unbelievably advanced technology, like flying cars, time machines, and many others, just like in the movies. Slowly, but surely, we take a step closer to that future. Many have dreams and hopes, and out of them, one stands above all. That reigning aspect would be none other than "Artificial ...

What to Do if You are a Victim of a Phishing Email
By: Gabriel Fernando
July 29, 2020

In this present day, you may receive phishing emails often, and some of us may even fall for such scams. Email Phishing attacks are by far the most common social attacks employed by cybercriminals and are on the rise. Phishing can also happen via text messages. The term phishing was coined because the scammers cast out a lure so that ...

Data Destruction Policy
By: Nihad Hassan
July 28, 2020

As the world continues to digitalize, the dependence on papers and photographs has become its lowest. Digital transformation has changed how we study, work, shop, communicate, travel, bank, and even how we take care of our health. Nowadays, most information is created digitally and does not go onto paper at all. Organizations of all types, both public and private, utilize computer ...

Office 365 Migration Course Review
By: Miguel Saiz
July 28, 2020

In the middle of the current pandemic, it has been proven that cloud services are a great tool to guarantee business continuity. Because Office 365 runs in the cloud, servers aren't needed for storage regarding websites, emails, or documents. Removing onsite servers will reduce both energy costs and the need for office space to store server hardware, which makes the cost ...

Big Data Analytics in Cybersecurity
By: Phillip Durst
July 27, 2020

What is Big Data? “Big Data” has become a bit of a catch-all term for really big sets of complex data. Complicated enough that traditional methods of analysis fail, and more information is presented than a human analyst could ever dream of processing. The idea of Big Data is important in modern business because businesses are inundated with ...

Azure or AWS: Which is Easier to Learn?
By: Matt Choi
July 27, 2020

Cloud adoption continues to rise as companies look for ways to empower remote workers, secure key documents anywhere, anytime, and deliver scalability on-demand. To streamline migration and make the best use of new cloud solutions, companies are looking for trained IT professionals — experts with the skills and certifications to solve challenges in-situ and seize opportunities at scale. They’re also looking ...

Managing Cybersecurity Challenges with Remote Teams
By: Tatianna Harris
July 27, 2020

How enterprise security leaders are protecting their remote distributed teams Although remote work is certainly nothing new, the onslaught of the Covid-19 pandemic caught many businesses off-guard. For them, managing remote teams with so little time to prepare has proven challenging, bordering on burdensome. In a matter of days, they had to issue company-owned laptops, deploy new virtual machines, and ...