Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 11, 2018
By:
4535

The Most Important Coverage on your Cyber Liability Insurance Policy
Content originally published on my Medium blog. Cyber Liability insurance is often referred to as the Wild Wild West of insurance, mainly because the forms and coverages differ so greatly from one to the next. It’s incredibly difficult for owners and c-level executives to differentiate one policy from the next and frequently their broker isn’t much help. I could bore you with all of the important items to look for in a cyber policy but instead prefer to focus on the two ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 11, 2018
2759

By: abrockwa
Authored in partnership with Raj Dhaliwal, Juris Doctor. Introduction While studying for the Certificate of Cloud Security Knowledge (CCSK), offered by the Cloud Security Alliance (CSA), one of the main domains of focus is “Legal Issues: Contracts and Electronic Discovery,” which includes international law and breach disclosure laws. The ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 11, 2018
2749

By: Zubair Ansari
Top 5 Industries where computers are used, and how they can be infected. Airports (Flight) Computers are commonly used in an airport for various purpose as like as to approve visas and tickets, an arrangement of an airplane, passengers, passenger’s security and others, etc. Disadvantage: A computer isn’t the complete system, means it ca ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 11, 2018
By:
3100

The Key to a Truly Secure Password
Passwords are important – Duh. They are one of the most important aspects of keeping your information secure. Whether personalized or randomized, they are something unique to you, and should not be easily guessed. The key to a great password is being random. You want something random and made up of all sorts of numbers, letters and symbols. Generally, the longer, the better. I personally recommend the site RandomKeygen.com, which allows you to generate random passwords ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 10, 2018
By: lauramathews
1150

How To Recover Corrupted Data From Pen Drives
If you are frustrated by corrupted data from pen drives, then there’s no need to worry about that. Here, you’ll get the proper solution for data recovery. Here, you will learn three methods for data recovery. Users Query “I had stored my all precious official PowerPoint and Word file documents in my pen drive. Yesterday, my boss asked me about these documents. Then I connected my pen drive to my laptop. I was shocked and disappointed because my pen drive was empty and ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 10, 2018
934

By: Dr. Michael J. Garbade
Android is a significant platform for mobile operators, which boasts of more than a billion users globally and a market share of about 80%. However, the platform is a target for malware schemers who are constantly infringing on the security of Android devices. Sunil Kumar, who is an India-based cybersecurity professional and currently teache ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 10, 2018
697

By: peternovack
On September 9th of 2017 Equifax the Credit Ratings major of U.S.A was in news. Now to those who are aware of the process it might not be something of a shock, after all, it just announced a major breach that affected almost half of America’s population and the way they handled the issue was also subject of intense media and political d ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 10, 2018
By: David Balaban
1210

Why Do ISPs Control the Amount of Data Transmitted by Every User?
The amount of data transmitted within a specific timeframe (bandwidth throttling) is one of the major issues Internet users encounter. Even if you diligently pay the bills for Internet access, your ISP may limit this access for a number of reasons. What are the ties between bandwidth, amount of data, your ISP and you? Controlling the amount of transmitted data is one of the biggest concerns that the average Internet user comes across. An Internet service provider may apply ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel