Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

June 12, 2019
By: eddiesegal
679

Open Source Security Risks and Vulnerabilities You Should Know
Open Source Software (OSS) components are essential for most applications today, often making up more than 50% of the codebase. Many organizations struggle to implement the appropriate security measures to protect against open source vulnerabilities. Once a vulnerability is fixed, another one pops up, and open source security can often seem like a losing game. This article explains the dangers of open source threats and vulnerabilities, provides a few methods for uncovering ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 7, 2019
2893

By:
This post originally appeared on “The Lockdown” , Thycotics Cyber Security Publication The cloud has certainly been a game changer, driving innovation and growth. Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 31, 2019
6019

By:
Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on. It’s no wonder that email-hosting services like Office 365 have become so popular. Such cloud-based email services ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 14, 2019
By: Deadshot
12915

A Different View of Defense in Depth Applied
Defense in Depth is something everyone in security talks about. It is one of the first things a security professional will know and understand when they start down their journey to the dark side. Which, cyber security is the dark side of Information Technology. We are the professionals that say no to all the kids running around. Most of the time security professionals are the parents in a company. Other times, if the company has not matured in this realm, they are the red he ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 14, 2019
By: dks11
11895

The Careful Art of Phishing Emails
While phishing has been around for a long time it still is something that each and every one of us experience in some way. To further this, its not going away either, only increasing as tools and skills get more and more advanced. To start I will share common tactics used in phishing emails, and then share ways to spot them. Urgency If you’ve ever received a phishing email, chances are the scammer made it seem like it was time sensitive. “You have only 24 hours to claim ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 10, 2019
11744

By:
The day has come – hackers’ have taken over every single password on the planet. For many, you may find yourself facing the end of the world as you know it. But before you panic, we have the essentials ready for you and your organization to survive. Your defense starts here. Get your password survival kit & free swag!
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 8, 2019
17721

By: CyberX
Let’s start with an analogy: A carpenter with many years of experience goes to a house to perform a job. He knows the tools at his disposal. When he needs to shave the bottom of the cabinet, for example, he goes to the truck and gets a belt sander. In short, he is able to use a wide range of tools to perform various tasks and make the e ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
May 7, 2019
By: TONY
4068

Setting up a Cyber Security Program – A CISO’s Guide.
Have you just taken up the role of CISO in your organization? Are you charged with the responsibility of building or maintaining the cybersecurity program your institution? Quite frankly, I neither envy you or your role. Perhaps like @MattEastwood depicted in the picture below, the responsibilities you shoulder is likely to ensure you do not get that desired sleep.  The internet today is awash with C-suite executives who lost their job on account of data breaches or cyber- ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel