Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

April 9, 2019
By: WhiteHat4Ever
21024

Malicious Tactics
Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Malware is often known as a piece of code or program that is crafted with the intent to covertly compromise of the CIA Triad (confidentia ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 6, 2019
9640

By: Vikrant Saran
Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project manager or as ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 5, 2019
10834

By: Dra4hos7
In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of ​​the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is compiled using Microsoft Visual Studio 2015, so some features in ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 2, 2019
By:
5878

What is Data Science?
Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as well as change not just how we do business but also how we can experience some of them. Data Science is also understood as science that decodes all the information abo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 29, 2019
By:
7000

How do you create an Enterprise Password Policy that actually gets used?
Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy changes coming up on this one. Your organization should practice strong password policy, but forcing a user to pick a new password themse ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 28, 2019
6235

By: lowebrew
The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 28, 2019
11824

By: PatAdel
As an early riser who typically starts his day around 4:45 am, it was way past my bedtime. My computer clock says 1:09 am and my eyes were still wide open with my brain exploring various paths available to me as my next step towards hacking the target box. Then I recalled how it all started and why this moment re-emphasized why I have alwa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 27, 2019
By: limor2019
4387

Preventing Cybersecurity Disaster: Learning from the Top Security Breaches in 2018
Looking back at 2018, it is difficult to ignore the chaos caused by the extensive incidents of data breaches that seemed to occur during each week of the year. Sensitive data and personally identifiable information of millions of individuals were exposed and made available on various platforms of the dark web for malicious users to buy and use. Data breaches are easily the single most worrisome trend in the world of cybercrime, and it does not look to be slowing down as we h ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel