0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

New Course "COBIT Foundations" Summary
By: Adhirath Kapoor
October 21, 2020

Information Technology is essential to every industry that exists in today's era. In itself, IT is a vast domain that needs to be incorporated with the associated industry in a very diligent manner. An important term that comes into play after successful incorporation is "IT Governance." It makes sure that the IT Departments are ready for any challenges thrown ...

"Cyber Network Security" Course Overview
By: Luis Carrillo
October 20, 2020

Data could be considered the most valuable asset both in our personal lives and in business. For this reason, data is highly susceptible to security attacks. The more data you store online, the more you and your business are at risk – almost no one is safe from cybersecurity threats. A hacker attack occurs every 39 seconds, affecting one in three ...

Is IoT Easy to Learn?
By: Michael Cunningham
October 20, 2020

The short, concise, and straightforward answer is "Yes" if one starts with the basics and builds a solid foundation. You are not trying to make a rocket to go to the moon. Now let us get into the fuller story. One of the first considerations is the extent of one's knowledge base. Are you a hobbyist radio repair tech? What ...

Cybersecurity Of The Internet Of Drones
By: Muhammad Bilal
October 19, 2020

There is a modern trend edging towards development in Unmanned Aerial Vehicles (UAVs). UAVs have supported various opportunities and opened paths at an effective cost in the development of technology. UAVs can be considered one of the best solutions in many surveillance areas, such as research, medical, agricultural, and transportation, due to the capability of dynamic reconfigurability, fast response, and ...

7 Pressing Questions and Answers about Cybersecurity Leadership in the Modern Era
By: Shelby Welty
October 16, 2020

Of all the executive positions in the enterprise, few have evolved as quickly as the role of the CISO. Traditionally, a CISO’s role focused on technical tasks, an approach that was sufficient in the past given the less complex and relatively slow-moving nature of cyberthreats. Today, it is a very different picture, where cyber risk is everywhere, and technology is ...

Course Summary: NIST Privacy Framework
By: S.E. Williams
October 16, 2020

Overview of the NIST Privacy Framework The data-processing ecosystem of business environments is often highly complex and dynamic, with ever-changing interconnected relationships (Green, 2020). In such environments, every role, depending on its responsibilities, may use privacy-related data for varying outcomes. Implementing the NIST Privacy Framework gives an organization a method to better manage all its systems, controls, and ...

Is It Easy To Tweet As Anyone?
By: Vedant Jain
October 16, 2020

On the 15th of July, 2020, Twitter was Hacked. High profile accounts on Twitter posted a tweet to ask their followers to send Bitcoin. Twitter said it was a social engineering attack, while the media and others claimed it was an insider attack. No matter what the real cause was, human factors were involved. __This brings up an interesting and ...

STRIDE-Threat Modeling Technique
By: Krutik Poojara
October 15, 2020

Threat modeling is the security process by which we can identify, categorize, and analyze threats. It can be utilized to identify the gaps remaining and achieve security before starting a single code line at the design phase. Threat modeling aims to reduce the risk and put proper security controls where we think of the potential security threats. A threat model ...

How Can I Learn Information Technology
By: Seyi Omidire
October 15, 2020

Information technology is such a broad topic that you will need help in dissecting and breaking it down to understand it. It's like saying, "I want to learn medicine." The next question you'll probably be asked is," What or which area in medicine do you want to learn or focus on?" e.g., doctor, nurse, or pharmacy, And to break it ...

Introduction to the OWASP API Security Top 10
By: Gildásio Júnior
October 14, 2020

In today’s world, many innovations come as an app. Banking, health & fitness, and e-commerce are some prevalent examples. Commonly, these apps adopt a modern system design created as a microservice or split the front and backend responsibilities. This type of coding practice employs more use and creation of Application Programming Interfaces (APIs). As these APIs are another input point ...