Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

February 27, 2019
By: sambocetta
1553

Why Corporations Need to Give their Employees Personal VPNs
Last year, the Cybersecurity Strategy Report was released by the House Energy and Commerce Committee’s Subcommittee. In a nutshell, the report found that the majority of current IT strategies major corporations are using are not working, and lays out various measures that can be used to strengthen them.   One such measure that was recommended in the report was to ensure that employees and other frequent business travelers travel with the ability to protect their corporate ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 26, 2019
2462

By: Tapan Jatakia
Linux Keyboard Shortcuts Linux Keyboard Shortcuts are a must for Linux Enthusiasts and Professionals. However, students studying Linux also could apply these to speed up their work process and understanding of Linux. User wanting to learn shortcuts & key combinations need to know the Pros and Cons first. Pros: Speedup Working Productivit ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
1404

By:
By : Christine Schaefer Notice anything new? At ThreatConnect, our philosophy since our founding has been that we would incorporate intelligence in all aspects of security operations including orchestration and workflow, as functionality within our Platform. We believe (and always have) that an intelligence-led defense benefits organizations ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
By: Devansh Bordia
1715

Scanning Fundamentals
 Scanning is a process of actively gathering information about the target with the intent of determining the various services, process, open ports, a live host, Os, version running on the system. This phase involves sending specially crafted packets to the victim in order to know insights about the system environment and configuration.D uring this process, it induces traffic into the network in order to reveal details about the target. The key findings in this process are l ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
By: Ace
2992

Synchronizer token pattern
In this post let’s discuss about using a synchronizer token pattern to prevent CSRF (CSRF meaning Cross-site request forgery.). Synchronizer token pattern (STP) is a technique where a token, secret and unique value for each request, is embedded by the web application in all HTML forms and verified on the server side.  Then the token is generated by the server with ensuring the uniqueness. In here server generates token per every session. In that case the attacker is un ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 23, 2019
3170

By: techalphy
MS Outlook is a widely utilized email client, across the globe to manage work perfectly. Mainly, its stores the complete mailbox data like contacts, calendar, emails etc., into PST file format. As we all know, the Outlook is a perfect email application but, it also consists of some negative aspects also. Sometimes, users confront with an erro ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 21, 2019
2831

By:
Author : Ben Nahorney For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are publishing our secon ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 20, 2019
By:
2315

Restoring or exporting?
Restoring or exporting? Which one suits you better? Well, we are talking about your emails. We believe you are backing them up to some drive. We won’t ask you how because that depends on how and where you want it; and how your company gets the task done. Here we will be discussing the post-disaster situation, where you have lost emails from the source, and you need them back. Before that, let’s learn the probable disasters. Mail Deletion due to office policies: Most ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel