0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Programming Language Should I Learn For Artificial Intelligence
By: Pierluigi Riti
October 9, 2020

Artificial Intelligence is one of the hottest topics today, but what are the best programming languages to learn for those interested in AI? Aside from the math necessary to design the algorithm, some programming languages are used in the Artificial Intelligence area. Python When we talk about Artificial Intelligence, the language one must know is Python. The huge number of ...

Data Safety In Cloud Services
By: Meenakshi Doppa
October 9, 2020

WHAT IS CLOUD STORAGE? Cloud storage is a remote network that uses a multi-tenant, highly virtualized infrastructure to provide flexible storage facilities for companies that can be dynamically provisioned as required by the enterprise. A large variety of cloud storage services offer this service. Predominantly, IT departments handling infrastructure-strained data centers would "throw boxes at the problem," which meant constantly adding ...

Impact of Cloud Computing - A Technology that Defines the Future
By: Sudipta Banerjee
October 7, 2020

History of Cloud Computing Over the past decade, cloud computing has been one of the mainframe technologies contributing to automation and data storage. The sudden hype about this technology came into existence when Amazon launched its first computing service AWS-Elastic Compute Cloud, in late 2006. Amazon Web Services (AWS), the sole proprietor of cloud, was extremely popularized among the emerging ...

Cybersecurity Breaches in 2020
By: Divya Bora
October 7, 2020

WHAT IS A SECURITY BREACH? In cybersecurity, a security breach is a successful attempt by an attacker to gain unauthorized access to an organization's computer systems bypassing the security mechanisms. Breaches may lead to theft of sensitive data, corruption or sabotage of data or IT systems, or actions intended to deface websites or damage reputation. Some countries have laws exposing the ...

Getting Started With CTFs
By: Apurv Tiwari
October 7, 2020

What is it? Capture the Flag is originally derived from gaming: arena type games where two players would pit against one another and capture the enemy's flag while defending their own. This game mode then got ported into the world of cybersecurity to develop and showcase one's skills. It's alright if you aren't a gamer. The only thing it shares ...

Communicating cybersecurity performance to corporate executives
By: Dr. Edward Amoroso
October 5, 2020

Given the rising tide of data breaches, the value of cybersecurity must be absolutely clear to everyone in the board room. But communicating this value, as well as the risks the company faces, is often challenging. Most business leaders would agree that cybersecurity is a top priority, but then they also have many other top priorities, such as dealing with ...

Social Engineering Course Summary
By: B.J. Dinesh Kumar
October 2, 2020

Some people consider hacking to be all about the use of technical capabilities or software. Well, they are wrong - in part. Everyone can learn how to use individuals to get confidential information, which would help them in their tasks, called Social Engineering—wondering how this is useful? Most of them would have read this famous saying over the internet, stating, ...

Find Your Resilience in Trusted Partners
By: Anthony Grieco
October 2, 2020

This blog was originally posted on cisco.com but has been reposted with permission by author. October is Cybersecurity Awareness Month and the first thought that comes to mind for me is the famous quote by Mike Tyson: “Everybody has a plan until they get punched in the mouth.” The world has experienced tremendous changes over the course of a few short ...

How Personal Devices (BYOD) Change The Threat Model For Organizations
By: Gerrianne Roberts, Ph.D.
October 1, 2020

BYOD, or Bring Your Own Device, is a program by which employees can use their own devices for work purposes. End-user devices can be anything ranging from their laptops to their cell phones. BYOD is meant to allow more flexibility within an organization. Not only does it allow employees to work on equipment that is owned by them and, in ...

Cybrary's Free Courses | October 2020
By: Tatianna Harris
October 1, 2020

The holiday season is upon us, and we're making 7 of our premium courses, FREE. This month's free courses are centered around Cybersecurity Awareness. Here is what's available to you to learn for free in October. We’ve made 7 courses (that are normally paid!) completely FREE for the entire month of October. Now, your free membership for includes some ...