0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Global State of Least Privilege Cyber Security
By: Erin Duncan
April 15, 2020

Thycotic partnered with Cybrary, the cybersecurity workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone planning or already down the path with their own least privilege security program. The report, “[2020 Global State of Least ...

What Do You Learn in Cybersecurity
By: Ravi Raj
April 15, 2020

Cybersecurity has a lot of domains to learn from, but one thing that summarizes it is the “need to protect the Cyberspace from cyber attacks.” We are living in a time where data is a form of currency and needs to be protected from falling into the wrong hands. Cybersecurity always starts from the basics. All of the learning that ...

Manage Evidence and Preserve Data by Properly Managing Security Cases
By: Jenna Crawford
April 13, 2020

Security Incidents and Breaches It seems like every week, there are breaking news articles on the latest security incidents and security breaches to various organizations. Have you ever wondered how security professionals handle cases for these incidents and security events? Are you a security professional who regularly handles incidents or security cases and wonder if you are handling the ...

Penetration Testing Execution Standard (PTES)
By: Hugh Shepherd
April 10, 2020

Cybrary’s course on the Penetration Testing Execution Standard (PTES) is an outstanding training offering. This course covers all phases of the PTES in detail and shows how they’re applied in real-world situations. If you’re a business owner that utilizes penetration testing (pentest), a provider of pentest services, or someone just interested in ethical hacking (i.e., penetration testing), I highly recommend ...

How Long Does It Take To Learn Cyber Security?
By: Richard Scott
April 9, 2020

Many people have asked, "How long does it take to learn Cyber Security?". This is an all too common question. Before you can answer it, you must first take a look at yourself. What are your interests, what are you good at; what is something that drives you? After you have completed this self-evaluation, we are ready to find the ...

Cybrary + NowSecure: Paving the Way to More Secure Mobile App Experiences
By: Ashleigh Lee
April 6, 2020

On a mission to save the world from unsafe mobile apps, NowSecure is excited to announce a new partnership with Cybrary to enable more people – anyone, anywhere – to upskill and deliver more secure mobile apps. A storm of mobile app security and privacy issues continues to intensify, while the skills gap widens. The launch of Cybrary’s first mobile app ...

Increased Hacker Activity During COVID-19; Discount Codes Offered on Darkweb in The Midst of A Global Pandemic
By: Nick Oles
April 3, 2020

As the world continues to shelter in place while reacting to the coronavirus, also known as COVID-19, it appears that hackers with nefarious intentions have taken a drastically different approach during these difficult times. Instead of dormancy, hacker groups are doing the opposite by rapidly increasing activity and tailoring attacks to capitalize on the fear with COVID-19 themed campaigns. This is ...

The Impact of Big Data on the Healthcare Industry
By: Evan Morris
April 3, 2020

Rapid technological advancement in recent times has seen Big Data infiltrating across industries pushing many verticals to adopt technology that supports better analytical capabilities. The healthcare industry is no exception to this growing trend with big global data in the healthcare market expected to reach $34.27 billion by 2022 1 at a CAGR (Compound Annual Growth Rate) of 22.07%. Why ...

Why I Should Study IoT
By: Michael Cunningham
April 3, 2020

Smartphones, smartwatches, smart TVs, smart refrigerators, Alexa, Bixby, Cirri, are all part of the Internet of Things. Each of these has one thing in common, and they are all connected to the World Wide Web using WIFI or Bluetooth. There are hundreds of other objects that are "smart." The wonderful world of the Internet of Things. All to make our ...

What Should a Cybersecurity Report Contain?
By: Sebastián Vargas
April 3, 2020

What should a cyber security incident report contain? In the next issue I will refer to a subject, which is becoming a real problem in companies today. I would like to go deeper into the minimum elements that a cybersecurity incident report should contain, which can be shared with the directory, technical teams, suppliers, partners, auditors and even the community. First we ...