0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Businesses are confronted with new cybersecurity threats every day, while simultaneously facing a growing need and shortage of cybersecurity experts. Many businesses are building successful cybersecurity teams by training their own IT personnel, however, trained personnel aren’t enough to be competitive in today’s business market. Cybersecurity workers must also be certified as experts in their fields. What are ...

Is Microsoft Certification Worth It?

By: Shelby Welty
June 26, 2020
The average computer user knows their way around essential Microsoft functions. Having a more comprehensive knowledge of Microsoft's programs can help advance a student's career and give them skills to complete more common tasks quicker and more accurately. What Is Microsoft Certification? Microsoft Certification "validates IT professional and developer technical expertise through rigorous, industry-proven, and industry-recognized exams," according to Microsoft. Obtaining ...
Shortage of Skills There is a steep trajectory of growing demand for cybersecurity skills in recent years. According to a report by New America 1 , in 2015, the global shortage of resources was forecasted to be 1.5M by 2020. However, in a recent article published by Infosecurity Magazine 2 , that number has climbed to 4M – exceeding estimates ...
Due to the COVID-19 pandemic, a US Military branch approached Cybrary in search of a partner to provide learning opportunities for its newly remote workforce to replace its in-classroom training. This US military group had a critical need for hands-on learning focused on networking, threat hunting, and cyber threat intelligence. This effort was to support the onboarding and development of their ...

Introduction to TLS 1.3

By: Vedant Jain
June 24, 2020
Introduction to TLSv-1.3 It's officially getting the Green Signal by the IETF (Internet Engineering Task Force), and it contains major improvements within the following three areas: Area of Privacy (Focused). Area of Performance. Area of Security. Let's look at each one. Unlike with TLSv-1.2, there appears to be some built-in motivation to upgrade, particularly with the Performance Booster, which in itself ...
In June, we announced our Onion ID acquisition and added three new Access Controller solutions to our Privileged Access Management portfolio: Cloud Access Controller, Database Access Controller, and Remote Access Controller. These Access Controllers allow you to embed security controls within the four highest-risk layers of any modern organization’s infrastructure: Clouds, Data, and Devices. Clouds: We now empower CISOs to ...

How to Learn Information Technology Online

By: Karim Bakhsh Amiry
June 23, 2020
Capturing the attention of many individuals across the world, the vast field of Information Technology, or "IT" has grown into one of the most sought out majors. Whereas, not being able to put time into joining the IT learning centers is a challenge that many people face. Fortunately, we have information about a wide range of topics on the internet ...
Having a difficult time balancing simplicity in security? You’re not alone. In our latest cybersecurity report, “Simplify to Secure,” we explore the consequences of stringing together point cybersecurity products and the complexity this can cause in your organization – along with the impacts on the effectiveness of the security ecosystem you’ve built. Quickly deploying a new technology without considering how it ...
Overview Cybrary is currently offering an overview course of the Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals. That is a very long title with a lot of benefits to unpack! First, the course is geared towards anyone interested in using data analytics or machine learning to help manage cyber threats in a network. The Sumo Logic ...
The rapid increase in the number and popularity of various development platforms has resulted in a substantial surge in cyber attacks. The conventional approach of initiating security testing at the later stages of software development is no longer feasible. From the very first stage and in each stage thereafter, security validations should be integrated into the development process to save ...