0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Outlook Internal Error Message?
By: kumarsandeep43
October 24, 2018

MS Outlook Shows Error Message Internal Error Code= 0000000E MS Outlook has two types of data files OST and PST. While PST is stored online on server the OST or (Offline Storage Table) is stored on the local computer which is a replica of PST. Both are important for smooth functioning of MS Outlook. Problem in OST ...

Certification Showdown: MCSA vs CCNA
By: Tatianna
October 24, 2018

Certification Showdown: MCSA vs CCNA, Who Wins? IT budgets are on the rise as companies look to bolster technology teams and drive business outcomes. As noted by ZDNet , predicted budgets for 2019 are on-track for 10 percent increases over this year’s spending to help accommodate the need for new resources, hardware, and IT personnel.Along ...

Linux Basics Terminal Commands
By: masjter_ZA
October 23, 2018

"Terminal commands" Terminal commands: Command Line Interface What is a command? A command is a software program that when executed on the CLI (command line interface) in the terminal, performs an action on the computer. When you type in a command, a process is run by the operating ...

Disinformation is a Cyber Security Threat
By: cynosurekp
October 23, 2018

It's just Fake News... If you are a person who follows news from social media as most people do, you are exposed to a daily dose of Fake News. Fake News, misinformation, junk, deliberately distributed deception and (the newest addition) “fake memes” are various names given to contrived material that is presented to be factually accurate. With ...

Successful Security isn't from Tools - Here's Why!
By: Guest Writer
October 22, 2018

The Opportunity for Successful Security Lies In Automation And Consolidation, Not More Tools In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just Integrate, Automate”.The survey results seem to indicate that ...

Solving Security Problems: Are Hodgepodge Solutions the Answer?
By: Guest Writer
October 18, 2018

Firms Throw a Hodgepodge of Solutions at Security Problems In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just Integrate, Automate”.In the study, Forrester immediately noticed that businesses address security concerns ...

Reconnaissance and Surveillance: Keyloggers
By: Guest Writer
October 16, 2018

An important tool for reconnaissance and surveillance, the keylogger is a program that records keystrokes on a device and maps them to a log. By reviewing this log, one can collect a wide range of useful and important information. As users enter their login credentials or other sensitive information into their keyboards, the keylogger collects this input. It does ...

Overconfidence Leaves Firms Exposed to Security Risk
By: Guest Writer
October 15, 2018

In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just Integrate, Automate”. Survey respondents were asked, “On average, how long does it take to identify and remediate an information security incident (including ...

The Most Important Coverage on your Cyber Liability Insurance Policy
By: travissholt
October 11, 2018

Content originally published on my Medium blog. Cyber Liability insurance is often referred to as the Wild Wild West of insurance, mainly because the forms and coverages differ so greatly from one to the next. It’s incredibly difficult for owners and c-level executives to differentiate one policy from the next and frequently their broker isn’t much help. ...

Expansion on Data Privacy and Protection Laws (CCSK Prep)
By: abrockwa
October 11, 2018

Authored in partnership with Raj Dhaliwal, Juris Doctor. Introduction While studying for the Certificate of Cloud Security Knowledge (CCSK), offered by the Cloud Security Alliance (CSA), one of the main domains of focus is “Legal Issues: Contracts and Electronic Discovery,” which includes international law and breach disclosure laws. The CCSKv4 exam itself does not ...