0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Course Review: Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals
By: S.E. Williams
June 23, 2020

Overview Cybrary is currently offering an overview course of the Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals. That is a very long title with a lot of benefits to unpack! First, the course is geared towards anyone interested in using data analytics or machine learning to help manage cyber threats in a network. The Sumo Logic ...

DevSecOps: The Essential Guide For Fortifying The Software Development Life-cycle
By: Nadine Habaybeh
June 22, 2020

The rapid increase in the number and popularity of various development platforms has resulted in a substantial surge in cyber attacks. The conventional approach of initiating security testing at the later stages of software development is no longer feasible. From the very first stage and in each stage thereafter, security validations should be integrated into the development process to save ...

Navigating Conflict Resolution in Cybersecurity Leadership
By: Tatianna Harris
June 22, 2020

How great conflict resolution skills help cybersecurity leaders drive better results > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Conflict is the very essence of cybersecurity. With cyberattacks having the ...

What is the NIST cybersecurity framework, and why does it matter?
By: Charles Owen-Jackson
June 20, 2020

How alignment with the NIST cybersecurity framework can help protect your business Barely a week goes by without a major cybersecurity incident making the headlines. But it’s the countless incidents targeting smaller businesses and individuals that tend to go unnoticed by the public at large. For too long have businesses taken a primarily reactive approach to cybersecurity threats. A good example ...

How to Protect IT During COVID-19
By: Pankaj Kamboj
June 19, 2020

During COVID-19, cyberattacks have increased by over 40%. Common targets are hospital chains as REvil ransomware targets the unpatched VPN servers there! So what does it mean? Cyber attackers are not leaving any stone unturned, using all means to exploit the networks, and VPN is not exempt. With the sharp increase of VPN for home users, it becomes pertinent for ...

Application of the MITRE Attack Framework
By: Hugh Shepherd
June 19, 2020

The "Application of the MITRE ATT&CK Framework" course by Cybrary is an excellent training offering. The course covers how to apply the attack framework to mitigate cyber threats. During the course, the 12 core areas of the MITRE ATT&CK Framework are discussed in detail. Also, learners will get detailed explanations of the various attack vectors used by ...

The Why, What, and How of Layered Cybersecurity
By: Charles Owen-Jackson
June 17, 2020

How the different layers of cybersecurity protect business in an evolving threat landscape As industries innovate at breakneck speed to keep up with modern demands, they’re facing a serious challenge mitigating the risks along the way. Every extra user account, device, online service, and application adds another potential entry point for cyberattackers. Attack surfaces have expanded to the point they’ve ...

Focus Areas To Enhance The Security Of An Organization
By: Pankaj Kamboj
June 17, 2020

As most people have witnessed during the COVID-19 pandemic, cybercriminals are more active, easily attacking organizations who never imagined having to focus on a new security front - their employees who are forced to work from home. Indeed, their infrastructures weren't ready to handle large amounts of VPN traffic, security around video conferencing, etc. As a consequence, attackers found ways ...

Review: Session Hijacking Course
By: Muhammad Bilal
June 17, 2020

News leaks, sensitive information going public, companies facing lawsuits over data leakage, and more other unfortunate events occur every day. These events are caused by the negligence of the digital infrastructure that is used daily. The systems used can be poorly designed and, hence, can leak sensitive data and credentials to hackers in real-time. In this course of “Session Hijacking,” the ...

The Role of Negotiation in Cybersecurity Leadership
By: Tatianna Harris
June 17, 2020

Why good negotiation skills are critical for enterprise security leadership This article was written to supplement Dr. Amoroso's course Enterprise Security Leadership: Negotiation Skills for Cyber Leaders. For decades, cybersecurity was purely the domain of the IT department. Measures to protect an organization against cyberthreats were viewed almost entirely from a technical perspective. For everyone else, cybersecurity knowledge barely extended beyond ...