0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Threat Modeling, The First Step Toward Security In Software Development Life Cycle (SDLC)
By: Krutik Poojara
June 2, 2020

Threat modeling is the security process by which we can identify, categorize, and analyze threats. Generally, threat modeling is done at an early stage in the software development lifecycle. Still, it can be performed at any stage whenever there is some change in the architecture or design. The purpose of threat modeling is to come up with the solution for ...

Remote Work And The Threat Landscape
By: Ben Nahorney
June 1, 2020

This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Last month, after the dust had settled from the move from office to remote work, we took a look at ways you could improve your security posture. In it, we discussed how you can shore up older and personal devices now being used for work ...

Why Learn Cybersecurity
By: Karim Bakhsh Amiry
June 1, 2020

Almost everyone around the globe uses the interconnected network, called the internet. Everybody plays a part here; for instance, many of the people have social media accounts. Some only use email services; still, others use online education and similar technologies. People share their most personal files over the internet, or send them to specific people, but is consideration given to ...

Can I Learn AI Without Coding?
By: Jitendra Singh
May 29, 2020

People have always wanted intelligent machines. This desire dates back to ancient Cultures. Various epics and mythological stories mention the presence of their own cosmic weapons, robots, and flying chariots. Engineers and artisans in India, China, Alexandria, Arabia, and the Greek World started making self-moving devices, flying bird models, animated machines, and automatons at around 3rd Century BC. This long-time ...

The Crucial Utterance On Top Of Darkweb’s Anonymization, Privacy, and Security Using Tor
By: Revanth S
May 29, 2020

The Internet is the world's most vigorous and broadest strength; it has become a way of life that people rely on. The Internet has become a sophisticated part of the day-to-day life of many people. It promotes interactive communication between two individuals over a transcending space. The Internet assists the function of the World's leading establishments like research centers, hospitals, ...

Is Cisco Certification Worth It?
By: Garrett Wilson
May 29, 2020

In the technology industry, some people believe that they can launch themselves into a position of success on talent alone. While that may be true for a small fraction of the tech population, most IT professionals have to leverage every little bit of their education and credentials to find success. This is especially true today, as many organizations now require ...

How To Set Up Your Own Media And File Server At Home Easily
By: B.J. Dinesh Kumar
May 28, 2020

I think everyone has heard the word SERVER, at least once in their lifetime. Since every one of us is in lockdown, I decided, "why not start my home server to store and access my music or files?" So we are going to learn how to set up our very own server for free. We are going to learn how to ...

Learning Cybersecurity & Hacking
By: Rvacyberdude
May 27, 2020

“Follow the white rabbit.” It’s one of the most iconic scenes in 1999’s The Matrix. Trinity hacks Neo’s terminal and types the message to him. Many at the time asked if the scene was even possible. The next question invariably is, “How can I learn to do that?” The short answer: Yes, it is possible ...

Business Continuity & Disaster Recovery Planning
By: Makeia Jackson
May 27, 2020

Every business should have a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). These plans are essential to keeping a business in operation during interruptions such as natural disasters, breaches, and pandemics. According to FEMA, roughly 40 to 60 percent of small businesses never reopen their doors following a major incident 1 , because there was no BCP ...

Cybrary Extends Exclusive Offers for Information Systems Security Association (ISSA)® Members to Scale Career Development
By: Amanda Davi
May 27, 2020

New initiative aims to help industry professionals scale skill sets Cybrary, the world's largest online cybersecurity career development platform, today announced that it will be extending exclusive offers to all individual and corporate Information Systems Security Association (ISSA)® members, including discounts for Cybrary’s Insider Pro and Cybrary for Business subscriptions. The new offerings aim to provide organizations the tools ...