Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 30, 2018
By:
2625

Common Sense Security Strategies
Common Sense Security Strategies in the Digital World You’ve been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you’re on a vacation and suddenly your credit card is declined or you’re in the airport and your flight is canceled. Maybe ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 30, 2018
4559

By: Iselin
­Networking Part 7 Antenna Types, MIMO, Wireless Standards & Technologies, Compatibility Antenna Types Transmitting radio waves through electric components An antenna is an electrical component made for sending and receiving radio signals. They convert electronic signals into electromagnetic waves and vice versa. Sometimes we need to tur ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 29, 2018
2444

By: richardb8006
The rise of SamSam ransomware This weekend the SamSam ransomware made the Dutch news. Why? Because SamSam is on the rise in our country. According to the article and source Fox-IT, small to medium  businesses are targets. The report of Sophos, a result of a thorough investigation, reveals that the cybercriminal or cybercriminals behind SamSa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 29, 2018
By: mohan1994
3142

Intrusion Detection System Vs. Intrusion Prevention System
Intrusion Detection System (IDS) is a computer security system that monitors network traffics for malicious activities and alert the network administrator when malicious activities detected. IDS performs a passive monitoring and implement in passive/promiscuous mode. IDS can detect the malicious activities but cannot prevent it. IDS have these capabilities include: Monitoring about malicious activities Auditing about malicious activities Forensics about malicious activitie ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 28, 2018
By: Dr. Michael J. Garbade
4085

Introduction to AI for Cyber Security Professionals
Improving threat prevention and detection is a strategic aspect of securing infrastructure against cyber attacks. Despite the availability of various resources that enhance cybersecurity, the tedious process that has previously relied on human involvement is like finding a needle in a haystack. Thanks to artificial intelligence (AI) technologies, significant breakthroughs have been made; and when leveraged, they allow proper defenses to be put up against cyber attacks with ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 28, 2018
5066

By:
Us Agile enthusiasts don’t like big projects. Instead, we like to split a big objective or goal into Epics and Features. If you are managing things well eventually you will end up with a product Roadmap. A Roadmap tells you broadly what features will be delivered and when. For a long time now, Scrum Masters and Product Owners have been usin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 27, 2018
1890

By: NessaT
Federal Loans and the Current State of Cybersecurity By Nessa Tragos, Cybersecurity Independent Consultant Will the Current Student Loan Debt Crisis Affect the Current State of Cyber Security? When I say debt, I’m not talking about technical debt that some companies have. I’m referring to the monetary debt that plagues many young ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 27, 2018
By: Iselin
1468

Digital Footprints, Publicity and Online Choices
In today’s society there are millions of people who utilize tools online to get to know others all around the globe. This includes voice calling, video chatting, texting, sharing posts and other fun things that are offered on online services. However, studies have shown that everything that is placed online is also a threat to stay there forever. Are we using the internet correctly, and should we be more aware of the traces that are left behind? Using social media sensibly ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel