0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Make People Take IT Security Seriously
By: Milan Cetic
June 30, 2020

False promises It all started when high tech became cool. When it suddenly was possible to brag with one’s computer in “normal” social circles. Similar to the late seventies and early eighties, when showing a pair of Macintosh mono amplifiers, coupled with Nestorovic Labs New Yorker speaker boxes (that together cost as much as a Porsche), to one’s friends was ...

"Privileged Access Management Fundamentals" Course Review
By: Saif Raza Raja
June 29, 2020

Overview: Cybrary’s course on Privileged Access Management (PAM) Fundamentals is a solution that helps any organization to use an existing Active Directory environment to restrict privileged access. It is a Beginner level course with no prerequisites required. This course covers all phases of the PAM in detail and shows how they’re applied in real-world situations. In this course, you will ...

The Importance of Cybersecurity Certifications and CEUs
By: Phillip Durst
June 26, 2020

Businesses are confronted with new cybersecurity threats every day, while simultaneously facing a growing need and shortage of cybersecurity experts. Many businesses are building successful cybersecurity teams by training their own IT personnel, however, trained personnel aren’t enough to be competitive in today’s business market. Cybersecurity workers must also be certified as experts in their fields. What are ...

Is Microsoft Certification Worth It?
By: Shelby Welty
June 26, 2020

The average computer user knows their way around essential Microsoft functions. Having a more comprehensive knowledge of Microsoft's programs can help advance a student's career and give them skills to complete more common tasks quicker and more accurately. What Is Microsoft Certification? Microsoft Certification "validates IT professional and developer technical expertise through rigorous, industry-proven, and industry-recognized exams," according to Microsoft. Obtaining ...

Developing Strong Cybersecurity Workforce Skills
By: Josh Lambert
June 26, 2020

Shortage of Skills There is a steep trajectory of growing demand for cybersecurity skills in recent years. According to a report by New America 1 , in 2015, the global shortage of resources was forecasted to be 1.5M by 2020. However, in a recent article published by Infosecurity Magazine 2 , that number has climbed to 4M – exceeding estimates ...

Cybrary Partners With a US Military Branch To Build Custom Training Programs
By: Wesley Samuel III
June 25, 2020

Due to the COVID-19 pandemic, a US Military branch approached Cybrary in search of a partner to provide learning opportunities for its newly remote workforce to replace its in-classroom training. This US military group had a critical need for hands-on learning focused on networking, threat hunting, and cyber threat intelligence. This effort was to support the onboarding and development of their ...

Introduction to TLS 1.3
By: Vedant Jain
June 24, 2020

Introduction to TLSv-1.3 It's officially getting the Green Signal by the IETF (Internet Engineering Task Force), and it contains major improvements within the following three areas: Area of Privacy (Focused). Area of Performance. Area of Security. Let's look at each one. Unlike with TLSv-1.2, there appears to be some built-in motivation to upgrade, particularly with the Performance Booster, which in itself ...

Thycotic Extends PAM Cloud Leadership with Acquisition of Onion ID
By: Kali Linette
June 24, 2020

In June, we announced our Onion ID acquisition and added three new Access Controller solutions to our Privileged Access Management portfolio: Cloud Access Controller, Database Access Controller, and Remote Access Controller. These Access Controllers allow you to embed security controls within the four highest-risk layers of any modern organization’s infrastructure: Clouds, Data, and Devices. Clouds: We now empower CISOs to ...

How to Learn Information Technology Online
By: Karim Bakhsh Amiry
June 23, 2020

Capturing the attention of many individuals across the world, the vast field of Information Technology, or "IT" has grown into one of the most sought out majors. Whereas, not being able to put time into joining the IT learning centers is a challenge that many people face. Fortunately, we have information about a wide range of topics on the internet ...

"Simplify to Secure" Cybersecurity Report From Cisco Secure
By: Tom Condrasky
June 23, 2020

Having a difficult time balancing simplicity in security? You’re not alone. In our latest cybersecurity report, “Simplify to Secure,” we explore the consequences of stringing together point cybersecurity products and the complexity this can cause in your organization – along with the impacts on the effectiveness of the security ecosystem you’ve built. Quickly deploying a new technology without considering how it ...