0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A CISO's Guide to WFH Security
By: Mike Gruen, CISO at Cybrary
March 18, 2020

As more and more companies are planning, and now executing, their emergency remote workforce strategies, we see an influx of articles with helpful WFH tips to stay productive. Here today, we are filling in some gaps other articles seemed to overlook. This short list of Dos and Don'ts geared for IT and Security teams will provide some helpful insights; however, ...

"Advanced Evimetry Forensic Acquisition: Dongle-less, Cloud, and Persistent Cloud" Course Review
By: Richard Beyer
March 11, 2020

With the prevalence of virtualization and cloud computing making major bounds in recent years, the old ways of forensic data acquisition are fading into oblivion. Not only are the storage device capacities increasing by orders of magnitude, but they are also often inaccessible within a data center halfway around the world. Simply removing the drive to connect a write-blocker, or ...

Guide Your Cyber Security Team to Success with Thycotic’s Next Webinar
By:
March 4, 2020

Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather. Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s responsibility—including the ...

Can A Non-IT Person Learn Cybersecurity?
By: Jenna Crawford
March 2, 2020

Cybersecurity is a serious buzz word these days, and jobs in cybersecurity are in high demand. It might seem like a highly specialized skill set, but I’m going to let you in on a little secret. Anyone can learn cybersecurity! You don’t need an IT background to jump in and start learning about cybersecurity; anyone, regardless of their background, can ...

By the Book: An Ethical Hacker’s Guide to Corporate Compromise
By: Doug Bonderud
February 28, 2020

Ethical hackers are in big demand. Recent data from the the EC Council 1 indicates this role is the number one role in demand and growing, with enterprises paying on average $90,000 salary, up to $140,000 annually to secure the services of a skilled ethical hacker. Despite the positive impact of white hat hackers in identifying and remediating cybersecurity issues, ...

Learn how Chinese hackers compromised Equifax
By: Adversary
February 18, 2020

The Equifax data breach of the summer of 2017 was one of the most impactful in recent history as it exposed sensitive data for as many as 143 million US consumers. It’s recently making the news yet again as the Justice Department just charged 4 Chinese military hackers for the breach. The full story of how this ...

Understanding North Korea's Advanced Persistent Threat (APT) Group 37
By: Julian Mark
February 14, 2020

One popular misconception in cybersecurity is what an advanced persistent threat (APT) is. An APT is a type of attack and not a threat actor (Lord, 2018). This attack is classified when an unauthorized user exploits a system and remains in that system undetected for a extensive period of time. APT threat actors do generally do not want to damage ...

Securing Industrial IoT
By: lpark
February 11, 2020

Enjoyed reading this Threat of the Month? Subscribe to the Threat of the Month blog series and get alerted when new blogs are published. This blog was originally posted on the Cisco Security Blog by author Ben Nahorney. Reposted with permission. It’s hard to ignore the ...

Laying the Groundwork: Three IT Training Paths to Help Build Your Career
By: SLWelty
February 10, 2020

Technology professionals are in demand as companies look to manage increasing IT complexity, optimize tech performance and deliver consistent ROI. For organizations, this presents a challenge as the need for skilled personnel outstrips available supply. But as noted by Information Week , there’s an industry shift underway as enterprises pivot toward “certified and soft skill-rich” candidates ...

3 Common Cybersecurity Career Paths and How to Get There
By: SLWelty
February 7, 2020

Today’s information technology and cybersecurity industries are exploding with job openings. In fact, there are more available positions in these fields than there are qualified professionals to fill them. There is no better time to begin a cybersecurity career than right now. Whether you are just out of college, or you are transitioning from another IT role, getting started in ...