0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Facing Onboarding Challenges in Cybersecurity
By: Josh Lambert
July 8, 2020

Businesses have to adapt to the expectations of the modern workforce rapidly. Employees are no longer satisfied with the slow learning curves and lengthy processes involved in onboarding. Surveys had found that almost 70% of employees stayed with a position for more than three years when their careers started with quality onboarding. Furthermore, new employees pose a significant cybersecurity risk ...

Handling BitLocker and FileVault 2: Evimetry and Mount Image Pro Alt: Mounting and Imaging an Encrypted Device
By: Chelsea Faye
July 7, 2020

Why is full disk encryption becoming more popular? Encryption works to protect businesses and individuals from data breaches by protecting information and systems using cryptographic methods. The encryption of individual files or folders has been common practice for years. With the introduction of modern computing processors, full disk encryption (FDE) has increased in popularity for the convenience of use ...

IoT Foundations of Trust Whitepaper Review
By: Chelsea Faye
July 7, 2020

Matthew Clark's IoT Foundations of Trust whitepaper caters to a variety of audiences and serves as a foundational document when discussing trust concepts in IoT. Technical audiences interested in IoT security should find the whitepaper informative and provide them with a solid basic understanding of trust concepts and hardware implementation options. Security leaders can also utilize this article to understand ...

Cryptography and Network Security
By: Kartik Agrawal
July 7, 2020

Cryptography is vital when we communicate with people remotely sitting in different places. Online communication should be done securely because communication channels are often unsecured. Examples of unsecured channels are public channels like telephone, internet, and email. The guarantee of secure communication is the fundamental objective of cryptography. To achieve this objective, we encrypt our messages to prevent someone other ...

What Are The Benefits Of Cloud Computing Certification?
By: John Nguyen
July 3, 2020

More and more businesses are moving their work online. There’s no better example of this need than 2020 and the massive shift in working from home during a worldwide pandemic. Workers across the planet are using cloud-based technologies to download and work remotely. Businesses can solve their unique market challenges using cloud technologies, but they need developers to create and ...

"Azure Functions" Course Review
By: Makeia Jackson
July 3, 2020

Are you new to the Microsoft Azure cloud and need to know about Azure Functions? Maybe you have heard of Azure but work with AWS, GCP, or some other cloud computing service? Whichever one it may be, Cybrary has you covered. In their one-hour course, you will learn how to develop Azure Functions. Cybrary's instructor Toddy Mladenov will cover in-depth ...

Cisco SecureX: Security for the Accelerated IT Agenda
By: Dr. Gee Rittenhouse
July 2, 2020

This blog was originally authored by Dr. Gee Rittenhouse and reposted with permission. For some time, we have been talking about how the digital transformation would be an accelerant that would cause companies to rethink old models, customer experiences and the workplace. It was always thought to be a milestone in the future that businesses would take incremental steps towards. ...

Talent Retention for Top Cybersecurity Talent
By: Phillip Durst
July 2, 2020

The number of certified cybersecurity professionals is not growing to meet demands, as an estimated three and a half million cybersecurity positions will go unfilled by 2022. The lack of talent to hire is not the only threat companies face when staffing for cybersecurity. Retaining cybersecurity talent is a new challenge, and traditional retention strategies often do not work ...

Managing Team Dynamics in Cybersecurity
By: Dr. Edward Amoroso
July 1, 2020

How winning at team dynamics facilitates stronger cybersecurity leadership > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Among the most pervasive misconceptions about cybersecurity is that it’s purely the domain ...

The Path to Cyber Security
By: Tahir Ibrahim
July 1, 2020

Do you want to get into Cyber Security, but not quite sure where to start? What routes to take? What help is out there to venture on to this path? Well, read on as this blog will outline just that. It can be a confusing time to choose the right training providers, which courses to start from, and who to use, ...