Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 15, 2019
By: jasminen
2164

Meet Your Instructor: Jeff Brown
    Fun Facts About Jeff! What course do you teach? AZ-300: Microsoft Azure Architect Technologies What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open water Diver license. Your favorite food? Before getting into the IT industry, I was a music major in college but decided that it was not ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 13, 2019
5129

By: ryan c
This blog is by authors: Ryan Corey, Co-Founder and Ralph Sita, Co-Founder, Cybrary The ever-expanding cyber threat landscape and never-ending shortage of cybersecurity skills make for a perfect storm across all industries. What has helped to counter this perfect storm is the subscription economy, where IT and security professionals can take ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 12, 2019
2464

By:
The practices of DevOps, Continuous Delivery, and Agile have become commonplace among the development and operations teams in most organizations. Even though application security is still young, vulnerabilities like XSS, SQLi, and remote code execution are current problems. Since HTTP is the common language of cloud, microservices, and server ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 11, 2019
By:
1720

Should You Outsource Cybersecurity or Keep It In-House
The diversity and sophistication of cyberattacks keep growing, posing threats for businesses of all shapes and sizes. Given that, it’s not surprising at all that the global cybersecurity market is expected to reach 300 billion by 20241. To avoid becoming victims of online threats, businesses need to invest in a solid cybersecurity strategy. This leads to two major options for them to choose – hiring an in-house Information Security team or outsourcing cybersecurity to th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 8, 2019
By:
2438

A Beginner’s Guide to Java Samples and SDKs on Azure
Azure offers remote access to enterprise-grade Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Database as a Service (DBaaS), and Software as a Service (SaaS). Azure’s data centers are spread across 54 regions, and its infrastructure is hybrid-ready, backed by over 90 compliance certifications, and provides a built-in backup1 module. This article provides a review of Java samples and SDKs created for use in Azure. Begin FREE Microsoft Azure Fundamentals ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2019
3137

By: twinkle.k.1927
The world is going mobile, and there is every reason to be mobile. At a time when everything is moving at a break-neck speed, we need to be on our toes, and thanks to mobile devices, we have got everything on our fingertips. The rise in mobile devices is a blessing for us. Still, at the same time, cybercriminals and hackers have also repositi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 5, 2019
2935

By: Savaramravindra4
Introduction Today, we are highly dependent on the internet, and this situation has resulted in new business models and revenue streams for companies. But, along with these, new opportunities arose for hackers to steal sensitive data such as PII (personally identifiable information), health records, financial data, etc. This is a huge concern ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 4, 2019
By: Solene Gabellec
2358

A Persistent Trojan Downloader for Android OS
This blog is by Knogin blog. Reposted with permission. A new security threat has emerged, this time for Android OS, making mobile security researchers scratch their heads for the past few months, the malware is called xHelper. The malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by infecting at least 2,400 devices on an average. A manual uninstall will not solve an issue as the app will ‘reappear̵ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel