0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How Will AI/ML Strengthen Cybersecurity & Prevent Breaches?
By: Shifa Martin
September 18, 2020

How Will AI/ML Strengthen Cybersecurity & Prevent Breaches? Tales of crippling security breaches are not new. Despite the warnings and exposure that these issues receive, companies seem indifferent, and compromises are on the rise. Within the last ten years, there have been 300 data breach incidents that include the theft of more than 100,000 records. Here are some data breach statistics ...

Attack Surfaces vs. Vulnerabilities
By: Makeia Jackson
September 18, 2020

By now, we can assume that there is no such thing as foolproof security. The only way to fail-safe a network is to unplug it. Where there is technology or IoT, we can assume vulnerabilities may be present. For an organization to maintain a secure and resilient environment, it must focus on implementing and practicing good "cyber hygiene." Below are a ...

From Mr. Bean to Mr. Bond: My path to being a cloud security special agent
By: Chris Pollard
September 18, 2020

Everyone starts building in the cloud in different ways - for some, it's a necessity as an organization mandates that you're moving to the cloud. For others, the allure of services such as Lambda, DynamoDB, and S3 (the 8th wonder of the world!) are enough to persuade you to give the cloud a try. Whatever your impetus for playing in ...

Integrating Security with Data Science
By: Pierluigi Riti
September 17, 2020

Data Science becomes more important every day. More projects are created, and steps are taken in the direction of how to use all of the data. Cyber Security can gain a huge advantage from the use of Data Science. Some of the main areas that can take advantage of Data Science are Network analysis and Spam identification. In this article, ...

A primer for building and managing robust security operations centers
By: Dr. Edward Amoroso
September 17, 2020

Building a security operations center (SOC) is a major undertaking, but it’s also an investment which empowers innovation and accelerates growth without adding undue risk. Establishing a SOC requires extensive planning combined with the optimal blend of technology, people, and process. The modern SOC is as much about people as it is technology. Success depends on the strong management of teams ...

How to Secure Data Across IT Estate
By: Pankaj Kamboj
September 16, 2020

As we all know, the 21st century belongs to data, making, or breaking an organization. Improper use of data or a leak of data can significantly harm an organization. Before you collect and use the data, whether it's your employee data or customer data, make sure you collect only those which is required for your business and at the same ...

Introduction to Deepfake
By: Pierluigi Riti
September 16, 2020

As suggested by the term, deepfake is a form of synthetic media in which an existing video or picture of a person is swapped with someone else's. This has become very easy nowadays. For only a couple of dollars per hour, a GPU can be rented, where it is possible to train the network and build a Deepfake. Deepfakes have ...

PMP Certification
By: Doug Bonderud
September 15, 2020

Management Potential: Unpacking the PMP Certification Project completion rates are on the rise — recent survey data found that in 2018 almost 70 percent of projects met their original goals, and just under 60 percent stayed on budget. As projects grow in size and scope; however, success becomes elusive: IT projects with budgets over $1 million are 50 percent more ...

Blockchain Technology In Information Security
By: Divya Bora
September 15, 2020

WHAT IS BLOCKCHAIN TECHNOLOGY? Simply put, Blockchain is a system of having information recorded in a way that makes it difficult to change, hack, or cheat the system. A blockchain is generally a digital ledger of duplicated transactions and distributed across the entire network of systems on the Blockchain. Each block contains a number of transactions, and every time a ...

Patch and Vulnerability Management
By: Ravi Raj
September 14, 2020

Unpatched vulnerabilities are one of the easiest ways for attackers to enter an environment. According to a new ServiceNow study conducted by the Ponemon Institute, an alarming 57% of cyberattack victims report that their breaches could have been prevented by installing an available patch. And 34% of those respondents were already aware of the vulnerability before they were attacked. The ...