0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Denial-of-service (DoS) Attack Tools
By: Nihad Hassan
November 10, 2020

Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are types of cyber attacks that attempt to make an online service, server, or network unavailable by overwhelming it with a flood of internet traffic. As its name implies, Network-based DoS uses one device to send a flood of internet traffic, while DDoS uses more than one device to send this traffic to the ...

The Top Azure Certifications
By: Shelby Welty
November 9, 2020

The Sky's the Limit: The Top Azure Certifications While Amazon was first to market, Microsoft has been steadily closing the cloud computing gap. As noted by ZDNet, Azure is now solidly in second place behind AWS offerings and is considered the "enterprise favorite" thanks to the broad adoption of Windows OS, productivity, and server products across business technology ecosystems. As a ...

Rethinking perimeter security in the age of distributed, virtualized computing environments
By: Dr. Edward Amoroso
November 9, 2020

This article was written to accompany the Designing Enterprise for Multi-Cloud course, on Cybrary. Enterprise computing has come a long way from the localized packet-switched networks of old. Today’s environment consists of a complex array of autonomous systems all over the world working together to get data where it needs to be. But as technology evolves, so too does the threat ...

The Importance of Cybersecurity in IoT
By: Gabriel Schram
November 6, 2020

The all-encompassing internet of things (IoT) is expanding at a rate that correlates with the influx of newer technologies at our disposal. Interconnectivity between devices is at an all-time high with no peak in sight. Moreover, IoT devices are taking on increasingly vital roles in fields and industries across the spectrum. The prospect of worldwide connectivity in a diversity of ...

Five Reasons To Turn On Multi-Factor Authentication
By: Nihad Hassan
November 6, 2020

Digital authentication is the process of identifying the identity of a user or a device against a computer system (e.g., a network, device, or application) to gain access to protected resources (data and sensitive applications). Digital authentication mechanisms are considered the backbone of information security in today’s digital age. In IT systems, a username and password remain the most used factor ...

The Rise Of The Virtual Conference. Reflections On Black Hat Asia
By: Daryl Sheppard
November 5, 2020

Without a doubt, this year has been a different one; and one that I doubt anyone would have anticipated come January 1. While unquestionably COVID has been terrible for the world, it has created a virtual conference. Rather than canceling major events that would have gathered thousands of people together in an unsustainable and unsafe environment, many events successfully pivoted ...

Threat Hunting Tools
By: Nihad Hassan
November 5, 2020

The active process of detecting abnormal activity within a computer network or system (e.g., server, workstation, mobile device, or IoT device) is called Cyber Threat Hunting. Discovered activities can be a sign of an ongoing attack (e.g., encrypting ransomware), exfiltration of data, command and control activity, or other malicious activity. Threat hunting is an active defense that works by proactively ...

Course Spotlight: Student Data Privacy Governance
By: Arun Vembanatt
November 4, 2020

Student Data Privacy Governance is one of the most discussed topics off-late. As you may be aware, the world has gone online due to the COVID pandemic, which has affected the entire planet. Especially for students, be it primary schooling or kindergarten, everything has become online, exposing their privacy. I should say that the Author Ivy Nelson has done a fantastic job selecting ...

Where To Get Cybersecurity Certifications
By: Shelby Welty
November 4, 2020

Right Place, Right Time: Where to Get Cyber Security Certifications When it comes to career potential, cybersecurity offers both expanding opportunities and increasing compensation. According to the U.S. Bureau of Labor Statistics, the average salary for infosec professionals now tops $99,000. The job market is predicted to grow at 31% through 2029, much faster than comparable industries. But landing cybersecurity jobs ...

What Is Cybersecurity Architecture
By: Nihad Hassan
November 3, 2020

Cybersecurity architecture, simply put, is a framework that defines the structure of an organization's cybersecurity posture, which includes consideration for its policies, standards, and business objectives. It accounts for the organization's computers, network devices, network interconnects, security capabilities, and the data that resides within the whole environment. The organization's foundational defense plan is considered to protect against cyber threats and ...