Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 15, 2019
By:
5310

How to ensure employee engagement in security awareness training
Originally posted on the AwareGO blog. Reprinted with permission. Training | May 9, 2019 | Ragnar Sigurðsson For over 30 years companies have been connected to networks and the internet. And for almost all of that time they have been dealing with cyber security threats. From all this experience one thing has become absolutely certain … The best way to secure your network and keep your data safe is security awareness among employees. Equally important is the employee enga ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 12, 2019
6194

By: Mike G.
In the fall of 2017, I joined Cybrary as the VP of Engineering, and like most startups, everyone here wears many hats. One of mine is the Head of Security. Protecting a rapidly growing company in the cybersecurity space with limited resources and no dedicated security personnel or systems is something I was well prepared for, having spent the ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2019
10139

By: leifjackson
In my career I have seen two market changing situations first hand: at Barclays during the credit crisis and at Equifax during the security breach. At Barclays during the credit crisis leading several unsecured loan products. Before 2008 I was not given a single second of credit risk training. The products I led went through a committee wh ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2019
By: robsmith2
4831

Are We Doing Our Part to Reduce Risk Properly?
The hardest part of any security professionals’ job, cyber or otherwise, tends to be dealing, in some cases, with a limit budget and management group that does not fully comprehend the value that the security professional’s role plays in the organization. Many smaller organizations with funding restrictions often view Cyber Security practices as a constraint on the business and any expenses going toward defending the business are overhead that could be better spent else ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 27, 2019
By: limor2019
7720

4 Security Risks of Cloud Digital Asset Management
  A picture is worth a thousand words, right? The growing demand for visual content and digital marketing worldwide has marketers looking for ways to better organize and manage their digital assets load. The numbers are clear, the digital asset management market is growing exponentially, and is expected to reach over $8 billion by 2024. More companies are turning to the cloud to take advantage of its accessibility and scalability. What are the risks involved in stori ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 26, 2019
7473

By: ryan c
There is a new trend across enterprise technical leaders, and that trend is “Security Enablement”. Security Enablement is the practice of infusing cybersecurity skill sets into ALL of the IT and technical professionals within the enterprise so that security best practices are deployed throughout the entire technology lifecycles of ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 25, 2019
4583

By:
Azure Recovery Service Vault: Recovery Service vault is a service from Microsoft for managing in house backup and data inside azure. By using this you can backup the for various Azure services such as IaaS VMs (Linux or Windows) and Azure SQL databases. Recovery Services vaults support System Center DPM, Windows Server, Azure Backup Server ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 25, 2019
By:
3002

Azure Blueprint Service, The new way to automate your subcription
Article by Vinoth Darwin What is an Azure Blueprint: Blueprints, in the traditional sense, are used by architects and engineers to design and build new things. They are used to ensure that the final products are built to specifications and in compliance with certain standards and requirements. Same way, Azure Blueprints helps you deploy and update cloud environments in a repeatable manner using composable artifacts such as Azure Resource Manager templates to provision resou ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel