0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Marriott Reports the Loss of 500 Million Customer Records in Massive Data Breach
By: Joe (Research Director)
November 30, 2018

Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach.   First, just the facts. On 30 November, 2018, Marriott International issued a press release ...

Is the CISSP Certification Worth it?
By: Vikrant Saran
November 30, 2018

CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying CBK - Common Body of Knowledge ...

The Open Source Intelligence Framework
By: Joshua Sodaghar
November 30, 2018

Open Source Intelligence (OSINT) is defined as intelligence collected from publicly available sources. In the intelligence community, the term "open" refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to understand for both cyber and physical security professionals. Today I ...

Digital Age Data Recovery Myths
By: manishbhickta26
November 29, 2018

With the increase in data loss occurrences, there is a massive demand for data recovery solutions. In the world of internet, the supply of information is often surplus than needed. However, a large number of solutions and fixes on the internet—that promises to restore data and fix most drive issues—consists of myths; Myths that can permanently destroy your ...

Success Series: 20% Pay Raise. 2 Cybersec Masters Programs Offers. 1 Determined IT coordinator.
By: Admin View
November 28, 2018

Nuno Filipe Romão Pereira lives in Portugal and works in Lisbon as a System Administrator and IT department Technical Coordinator. After a few months as a Cybrary Insider Pro, he experienced some amazing results from his career development studies, and offered to share them on Cybrary as inspiration for other Cybrarians. In early 2018, I ...

Web Application Firewall
By: Yeridani
November 28, 2018

The new age security growing under different aspects, the spotlight are direct now to the Web Application Firewall (or WAF) filters for monitors, and blocks  HTTP   traffic  to and from a  web application , the proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch and Web Application Firewall (WAF) ...

IT in the C-Suite, Part 1: What is a CISO?
By: Tatianna
November 28, 2018

IT in the C-Suite, Part I: What is a Chief Information Security Officer? Technology equals opportunity for enterprises: The opportunity to attract new customers, increase efficiency and drive greater revenues.The problem? Technology also presents an opportunity for bad actors: As noted by ZDNet a new ransomware pack that includes 23 threat varieties could “make ...

Security in the Cloud
By: jdthbear
November 27, 2018

Cloud computing is not a new concept. Many companies are already knee deep in Cloud, it is generally presented as the next logical move, particularly to replace an organization’s Infrastructure. It's also good for tech startups as it cuts out a cost on infrastructure in the early stages. The benefits of cloud are well known, however, this article explores ...

iPhone Virus Attacks & the Importance of Anti-Virus Management
By: jdthbear
November 26, 2018

Imagine you wake up one morning and see the screen below on your PC. You press every button, turn it off and on again, and the screen remains the same. Yes, maybe you would want to cry! Guess that’s where the name came from…This is exactly what happened to Apple’s iPhone processor supplier. Taiwan ...

Networking part 2 DNS DHCP MAC
By: Iselin
November 24, 2018

Networking Part 2 DNS “The human name of IP addresses” Allows the computer to translate human names to IP addresses In order to make it easier to browse the web more efficiently, we translate our destination addresses to Domain Names. 172.217.20.46 ...