0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Thycotic partnered with Cybrary, the cybersecurity workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone planning or already down the path with their own least privilege security program. The report, “[2020 Global State of Least ...


Cybersecurity has a lot of domains to learn from, but one thing that summarizes it is the “need to protect the Cyberspace from cyber attacks.” We are living in a time where data is a form of currency and needs to be protected from falling into the wrong hands. Cybersecurity always starts from the basics. All of the learning that ...


Security Incidents and Breaches It seems like every week, there are breaking news articles on the latest security incidents and security breaches to various organizations. Have you ever wondered how security professionals handle cases for these incidents and security events? Are you a security professional who regularly handles incidents or security cases and wonder if you are handling the ...


Cybrary’s course on the Penetration Testing Execution Standard (PTES) is an outstanding training offering. This course covers all phases of the PTES in detail and shows how they’re applied in real-world situations. If you’re a business owner that utilizes penetration testing (pentest), a provider of pentest services, or someone just interested in ethical hacking (i.e., penetration testing), I highly recommend ...


Many people have asked, "How long does it take to learn Cyber Security?". This is an all too common question. Before you can answer it, you must first take a look at yourself. What are your interests, what are you good at; what is something that drives you? After you have completed this self-evaluation, we are ready to find the ...


On a mission to save the world from unsafe mobile apps, NowSecure is excited to announce a new partnership with Cybrary to enable more people – anyone, anywhere – to upskill and deliver more secure mobile apps. A storm of mobile app security and privacy issues continues to intensify, while the skills gap widens. The launch of Cybrary’s first mobile app ...


As the world continues to shelter in place while reacting to the coronavirus, also known as COVID-19, it appears that hackers with nefarious intentions have taken a drastically different approach during these difficult times. Instead of dormancy, hacker groups are doing the opposite by rapidly increasing activity and tailoring attacks to capitalize on the fear with COVID-19 themed campaigns. This is ...


Rapid technological advancement in recent times has seen Big Data infiltrating across industries pushing many verticals to adopt technology that supports better analytical capabilities. The healthcare industry is no exception to this growing trend with big global data in the healthcare market expected to reach $34.27 billion by 2022 1 at a CAGR (Compound Annual Growth Rate) of 22.07%. Why ...


Smartphones, smartwatches, smart TVs, smart refrigerators, Alexa, Bixby, Cirri, are all part of the Internet of Things. Each of these has one thing in common, and they are all connected to the World Wide Web using WIFI or Bluetooth. There are hundreds of other objects that are "smart." The wonderful world of the Internet of Things. All to make our ...


What should a cyber security incident report contain? In the next issue I will refer to a subject, which is becoming a real problem in companies today. I would like to go deeper into the minimum elements that a cybersecurity incident report should contain, which can be shared with the directory, technical teams, suppliers, partners, auditors and even the community. First we ...