0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Impact of Big Data on the Healthcare Industry
By: Evan Morris
April 3, 2020

Rapid technological advancement in recent times has seen Big Data infiltrating across industries pushing many verticals to adopt technology that supports better analytical capabilities. The healthcare industry is no exception to this growing trend with big global data in the healthcare market expected to reach $34.27 billion by 2022 1 at a CAGR (Compound Annual Growth Rate) of 22.07%. Why ...

Why I Should Study IoT
By: Michael Cunningham
April 3, 2020

Smartphones, smartwatches, smart TVs, smart refrigerators, Alexa, Bixby, Cirri, are all part of the Internet of Things. Each of these has one thing in common, and they are all connected to the World Wide Web using WIFI or Bluetooth. There are hundreds of other objects that are "smart." The wonderful world of the Internet of Things. All to make our ...

What Should a Cybersecurity Report Contain?
By: Sebastián Vargas
April 3, 2020

What should a cyber security incident report contain? In the next issue I will refer to a subject, which is becoming a real problem in companies today. I would like to go deeper into the minimum elements that a cybersecurity incident report should contain, which can be shared with the directory, technical teams, suppliers, partners, auditors and even the community. First we ...

Why Learn DevOps
By: Jitendra Singh
April 3, 2020

DevOps is a set of practices or processes that combines software development and information technology operations. It is becoming popular because it enables businesses to achieve mainly two objectives; decrease systems development life cycle time and provide continuous product delivery with high quality. Increasing the pace of software delivery is not possible with traditional software development methodology as the methods ...

Toll Ransomware Attack - The Dark Side of Encryption
By: Anthony Canning
April 3, 2020

Who is Toll and what happened? On the 31st of January 2020, Toll, an Australian based, internationally operating shipping and logistics company was the subject of a targeted ransomware attack. In response, the company shut down as many as one thousand infected servers, which effectively crippled its IT infrastructure and brought logistics operations to all but a standstill. The company ...

The Role of Emotional Intelligence in Life and Security Teams
By: Mark Nibert
April 2, 2020

What is Emotional Intelligence? Emotional intelligence is the ability to recognize and identify your own emotions, understanding the feelings of others, and using your ability to manage emotions to work within both realms. One of the critical aspects of being a leader, mentor, or even a teammate is the ability to understand others. As a leader, it means understanding how ...

Ethical Leadership: How to Think and Respond
By: Duane Clouse
April 2, 2020

Ethical Leadership, where to begin? As a leader, or someone looking to be a leader, you are probably thinking to yourself, how do I build and maintain a strong ethical foundation in my job and continue down an ethical path that is effective and trusted both inside and outside of my professional and personal life. In ...

How to Learn Cybersecurity From Scratch
By: Devansh Agarwal
April 2, 2020

As a student like most of you, I have just joined my first job as a penetration tester. Today, we will discuss the stepping stones to obtain a profession in cybersecurity. Most of the suggestions I will provide are based on what I and my fellow mates have experienced. What is better for a fresh beginner to learn from the ...

How Cloud Knowledge Gets You a Job
By: Doug Bonderud
April 1, 2020

It’s no exaggeration to say that cloud computing has fundamentally changed the IT landscape. Once a technology outlier, this distributed deployment model is now critical for companies to drive agility and adaptability at scale. Investment reflects growing this interest: As noted by Tech Crunch, revenue from the cloud infrastructure market alone passed $30 billion in the fourth quarter of 2019,and ...

The Shift to a Remote Workforce and Keeping it Cyber Secure
By: Thycotic
March 27, 2020

Cyber Security Teams Quick Guide to working Remotely and Securely-large (1) As employees are packing up their office equipment and shifting to working remotely, they are facing serious risks and exposure to cybercriminals wanting to take advantage of these increased opportunities. A well-executed transition will make working from home possible and maintain security, and it will do so within the limitations ...