Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 16, 2019
By: Solene Gabellec
667

Android Vulnerability – NFC exploitation
This blog is by Knogin blog by author Anthony Carballo. Reposted with permission. It was found in Android OS versions 8.0 & higher that the security warning message to install external apps does not prompt users when an app is transferred via NFC (Near Field Communication). This can give nefarious actor leverage to send and install a PUA (Potentially Unwanted Application) to your phone. Contrary to earlier Android versions where the system shows a notification to the use ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 15, 2019
791

By: jasminen
    Fun Facts About Jeff! What course do you teach? AZ-300: Microsoft Azure Architect Technologies What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open wa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 13, 2019
3307

By: ryan c
This blog is by authors: Ryan Corey, Co-Founder and Ralph Sita, Co-Founder, Cybrary The ever-expanding cyber threat landscape and never-ending shortage of cybersecurity skills make for a perfect storm across all industries. What has helped to counter this perfect storm is the subscription economy, where IT and security professionals can take ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 12, 2019
By:
1778

5 Steps to Modernize Security in the DevSecOps Era 2020
The practices of DevOps, Continuous Delivery, and Agile have become commonplace among the development and operations teams in most organizations. Even though application security is still young, vulnerabilities like XSS, SQLi, and remote code execution are current problems. Since HTTP is the common language of cloud, microservices, and serverless, these problems might be getting worse. This is the modern era of computing, and we recommend taking these five steps to ensure ap ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 11, 2019
By:
1552

Should You Outsource Cybersecurity or Keep It In-House
The diversity and sophistication of cyberattacks keep growing, posing threats for businesses of all shapes and sizes. Given that, it’s not surprising at all that the global cybersecurity market is expected to reach 300 billion by 20241. To avoid becoming victims of online threats, businesses need to invest in a solid cybersecurity strategy. This leads to two major options for them to choose – hiring an in-house Information Security team or outsourcing cybersecurity to th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 8, 2019
2346

By:
Azure offers remote access to enterprise-grade Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Database as a Service (DBaaS), and Software as a Service (SaaS). Azure’s data centers are spread across 54 regions, and its infrastructure is hybrid-ready, backed by over 90 compliance certifications, and provides a built-in back ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2019
2948

By: twinkle.k.1927
The world is going mobile, and there is every reason to be mobile. At a time when everything is moving at a break-neck speed, we need to be on our toes, and thanks to mobile devices, we have got everything on our fingertips. The rise in mobile devices is a blessing for us. Still, at the same time, cybercriminals and hackers have also repositi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 5, 2019
By: Savaramravindra4
2804

Blockchain in Cybersecurity: All You Need to Know
Introduction Today, we are highly dependent on the internet, and this situation has resulted in new business models and revenue streams for companies. But, along with these, new opportunities arose for hackers to steal sensitive data such as PII (personally identifiable information), health records, financial data, etc. This is a huge concern in today’s online world, and this is becoming more intense and prevalent day-by-day. Begin FREE Introduction to IT & Cybersecu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel