0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Are You Properly Using Your Hoodie as a Penetration Tester?
By: clarkincnet
August 4, 2018

Rapid7 released a research report last month entitled Under the Hoodie – Lessons from a Season of Penetration Testing .   The report outlines some interesting finds from 268 penetration engagements from the period of September 2017 through June 2018. Maybe it’s just me, but using the word “hoodie” in the name of the report conjures an image of ...

Should You Become a Cyber Security Engineer?
By: ginasilvertree
August 2, 2018

These days, many people are asking themselves whether they should become cyber security engineers. As cyber jobs increase exponentially and thousands of cyber positions remain open, it’s a good time to ask this question. In this post, we’ll explore ...

Best Ways To Attract Customers
By: lisabrooke
August 1, 2018

It is always difficult to figure out ways to attract new customers. After all, you are competing for the same customers as your rivals are. But there are ways you can gain a competitive edge so that you can consistently find and keep new customers, as well as retain those customers who have been with you from ...

A Brief Introduction to Kali Linux for Cybersecurity
By: Dr. Michael J. Garbade
July 31, 2018

What is Kali Linux? Kali Linux, initially released in 2013, is a popular Debian-based Linux distribution operating system mainly used by penetration testers and digital forensics experts. The cyber security tool is maintained and funded by Offensive Security Limited, a prominent IT security company. Kali ...

CASB Benefits in the Digital World in 2018
By: Ugra Narayan Pandey
July 31, 2018

A security gateway is established between an organizational infrastructure and a cloud service provider. The name of this gateway is the cloud access security broker or CASB. Enterprises adopt CASB benefits to expand their policies of IT governance and comply with regulations to third-party storage and applications. There is a need for CASB cloud services if ...

Migrating SQL Server 2008 to Amazon RDS: A Complete Guide
By: justin hansen
July 30, 2018

Are you a user of SQL Server 2008 or SQL Server 2008 R2? Are you planning to migrate to Amazon RDS as soon as Microsoft ends support for these SQL Server versions? Read this post, as you will learn two different ways to migrate from SQL Server 2008 to Amazon RDS.Microsoft will be stopping extended support for SQL ...

Modems vs. Routers
By: Jessica
July 29, 2018

If you’ve ever had to go through the process of moving into a new house, then you may be familiar with one of the tasks that come with the moving process: setting up Internet service in your new home. Most people just call their internet service provider (ISP), talk to the tech support department, and schedule a technician to ...

Bluetooth Security Risks
By: Jessica
July 29, 2018

If you’re a heavy Bluetooth user, then you’re more than familiar with how much easier it makes everyday life. It’s pretty much a multi-task facilitator. With this technology, you can make hands-free phone calls while driving, allowing you to waste no time in traveling to destinations while handling important calls safely on the road. If you’re at home, you ...

Re-Thinking Information Security: The Value of Information
By: Terumo
July 29, 2018

If someone you don't know approached you on the street and asked for your address, social security number, or ID number, would you give it?Since we consider it “personal” and a “huge violation of our privacy,” you probably wouldn’t, but since we don't think our email has the same value as a social security number or ID number, you ...

Hacking User Accounts Without Programs in Win10 Home
By: dnieves
July 27, 2018

Welcome to hacking Windows 10 Home profiles! This walkthrough only applies to Win10 Home without any encryption software. Encryption software like Bitlocker or Bitcrypt will block this capability. Win10 Pro Edition without encryption software or on a domain may work, but it hasn't been attempted yet.These issues don't come up often, but when they do, we can get frustrated. ...