Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

February 15, 2019
By: Muhammad Tariq Ahmed Khan
771

Cybersecurity Internal Audit Considerations
Since the threats from cyberattacks have emerged significantly and are continuously evolving, managing cybersecurity risks has become one of the substantial challenges faced by the organizations nowadays. Organizations have put in place technical and procedural controls to attain optimum cybersecurity. Furthermore, governments and regulators have played a predominant role in improving cybersecurity posture by increasing oversight, imposing more regulatory mandates and conduct ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 15, 2019
726

By: sambocetta
The autumn of 2018 brought something new to the general alert system of the United States. While the country’s old Emergency Alert System (EAS) that’s been in place for decades is still in use, a process for using text message alerts was added. The first test of what has been dubbed the Presidential Alert System appeared to be a success. ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 14, 2019
1176

By:
I love that we live in an era where we can communicate almost instantaneously with friends, relatives, and colleagues. I am thankful that God graced me a career field where I can work remotely and is in high demand and seems like it will always be so. Of course, no one gets where they are alone, although I did work my rear off to get where I a ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 14, 2019
By: Ahmed Abouzid
1831

My Educational Journey, advises and tricks to shift career from Police Officer to Cyber Se ...
Hello everybody… Before reading my contribution here, I will explain in the beginning the following: why I am posting this! what you will find and might learn. Index of content. ( DON’T WASTE YOUR TIME ) because I know that your time is the most valuable thing you own in life… so if you can’t find your interests in the indexes, then this post is not for you, LET’S START.   1) why I am posting this? >>> because I want to archive my ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 13, 2019
By: Dra4hos7
1114

A new attack poses a threat even for TLS 1.3
A consolidated team of specialists from Tel Aviv University, the University of Adelaide, the University of Michigan, the Weizmann Institute, as well as the NCC Group and Data61 presented a report(PDF) on the new variations of the Bleichenbacher attack, which is a threat even to the newest TLS 1.3. To understand the essence of the problem, you need to remember what the Bleichenbacher attack is. Back in 1998, Bell Laboratories specialist Daniel Bleichenbacher  discovered a ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 13, 2019
1015

By: kumarsandeep43
SQL Server is the best database used by organizations. Large applications run of SQL database and use to store their data. However, human errors or system failure may cause corruption in database. So, it is better to adopt methods to prevent SQL database corruption. Database corruption could lead to huge data loss and thus proper maintenance o ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
February 9, 2019
2888

By:
Working as Domain Specialist for 4 years Phishing Websites, Infringement, Abuse, Domain Phishing and all website illegal activities are no longer new to me.  Every day we caught potential domain phishing registration in our system like peypal.com, paaypal.com or myalert-securedauto-inboxlogin.com, a domain name that is very close to PayPal.c ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
2701

Who is the CyberSecurity Specialist?
Who is the CyberSecurity Specialist? What is he/she like? Who is he/she? What must he/she do to keep up to date? Where does he/she gather information? What skills are needed? This article and those that follow will be my attempt to answer these questions. The CyberSecurity Specialist certification is designed specifically for the Network Security Analyst Role. This person is responsible for monitoring network traffic, identifying potential threats, investigating threats, ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel