0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

IoT Foundations of Trust Whitepaper Review
By: Chelsea Faye
July 7, 2020

Matthew Clark's IoT Foundations of Trust whitepaper caters to a variety of audiences and serves as a foundational document when discussing trust concepts in IoT. Technical audiences interested in IoT security should find the whitepaper informative and provide them with a solid basic understanding of trust concepts and hardware implementation options. Security leaders can also utilize this article to understand ...

Cryptography and Network Security
By: Kartik Agrawal
July 7, 2020

Cryptography is vital when we communicate with people remotely sitting in different places. Online communication should be done securely because communication channels are often unsecured. Examples of unsecured channels are public channels like telephone, internet, and email. The guarantee of secure communication is the fundamental objective of cryptography. To achieve this objective, we encrypt our messages to prevent someone other ...

What Are The Benefits Of Cloud Computing Certification?
By: John Nguyen
July 3, 2020

More and more businesses are moving their work online. There’s no better example of this need than 2020 and the massive shift in working from home during a worldwide pandemic. Workers across the planet are using cloud-based technologies to download and work remotely. Businesses can solve their unique market challenges using cloud technologies, but they need developers to create and ...

"Azure Functions" Course Review
By: Makeia Jackson
July 3, 2020

Are you new to the Microsoft Azure cloud and need to know about Azure Functions? Maybe you have heard of Azure but work with AWS, GCP, or some other cloud computing service? Whichever one it may be, Cybrary has you covered. In their one-hour course, you will learn how to develop Azure Functions. Cybrary's instructor Toddy Mladenov will cover in-depth ...

Cisco SecureX: Security for the Accelerated IT Agenda
By: Dr. Gee Rittenhouse
July 2, 2020

This blog was originally authored by Dr. Gee Rittenhouse and reposted with permission. For some time, we have been talking about how the digital transformation would be an accelerant that would cause companies to rethink old models, customer experiences and the workplace. It was always thought to be a milestone in the future that businesses would take incremental steps towards. ...

Talent Retention for Top Cybersecurity Talent
By: Phillip Durst
July 2, 2020

The number of certified cybersecurity professionals is not growing to meet demands, as an estimated three and a half million cybersecurity positions will go unfilled by 2022. The lack of talent to hire is not the only threat companies face when staffing for cybersecurity. Retaining cybersecurity talent is a new challenge, and traditional retention strategies often do not work ...

Managing Team Dynamics in Cybersecurity
By: Dr. Edward Amoroso
July 1, 2020

How winning at team dynamics facilitates stronger cybersecurity leadership > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Among the most pervasive misconceptions about cybersecurity is that it’s purely the domain ...

The Path to Cyber Security
By: Tahir Ibrahim
July 1, 2020

Do you want to get into Cyber Security, but not quite sure where to start? What routes to take? What help is out there to venture on to this path? Well, read on as this blog will outline just that. It can be a confusing time to choose the right training providers, which courses to start from, and who to use, ...

"Azure Policies" Course Review
By: Makeia Jackson
July 1, 2020

Companies hosting their hardware, software, and servers are slowly but surely becoming something of the past. Businesses are increasingly relocating their mission-critical infrastructure into the cloud. With this move, they transfer some of their security, risk, and compliance responsibilities to cloud service providers like Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Salesforce, to name a few. Azure ...

IoT & Cybersecurity: Should You Really Use IoT Systems?
By: Meriem OUADAH
June 30, 2020

Could you go back years ago to a time where you could not send emails and text messages, or post online? It feels strange to imagine one's life without all these things, most importantly, without the internet that makes it possible. So, what is the Internet? The Internet is a worldwide system of connected computer networks, "a network of networks, "in ...