0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical hackers are in big demand. Recent data from the the EC Council 1 indicates this role is the number one role in demand and growing, with enterprises paying on average $90,000 salary, up to $140,000 annually to secure the services of a skilled ethical hacker. Despite the positive impact of white hat hackers in identifying and remediating cybersecurity issues, ...
next.techlab Announcing the New Partnership We are excited to announce a brand new partnership between Next Tech and Cybrary! Keeping pace with the speed of the change in the cybersecurity industry can be one of the toughest challenges for a professional. After speaking with thousands of CISOs and security managers from leading organizations, we are finding a greater need for cybersecurity professionals ...

Learn how Chinese hackers compromised Equifax

By: Adversary
February 18, 2020
The Equifax data breach of the summer of 2017 was one of the most impactful in recent history as it exposed sensitive data for as many as 143 million US consumers. It’s recently making the news yet again as the Justice Department just charged 4 Chinese military hackers for the breach. The full story of how this hack took place ...
One popular misconception in cybersecurity is what an advanced persistent threat (APT) is. An APT is a type of attack and not a threat actor (Lord, 2018). This attack is classified when an unauthorized user exploits a system and remains in that system undetected for a extensive period of time. APT threat actors do generally do not want to damage ...

Securing Industrial IoT

By: lpark
February 11, 2020
Enjoyed reading this Threat of the Month? Subscribe to the Threat of the Month blog series and get alerted when new blogs are published. This blog was originally posted on the Cisco Security Blog by author Ben Nahorney. Reposted with permission. It’s hard to ignore the ...
Technology professionals are in demand as companies look to manage increasing IT complexity, optimize tech performance and deliver consistent ROI. For organizations, this presents a challenge as the need for skilled personnel outstrips available supply. But as noted by Information Week , there’s an industry shift underway as enterprises pivot toward “certified and soft skill-rich” candidates ...
Today’s information technology and cybersecurity industries are exploding with job openings. In fact, there are more available positions in these fields than there are qualified professionals to fill them. There is no better time to begin a cybersecurity career than right now. Whether you are just out of college, or you are transitioning from another IT role, getting started in ...
Demand for skilled IT professionals is exploding — companies can’t find enough skilled, entry-level staff and the problem is getting worse. Adoption of “new collar” approaches that prioritize skillsets and industry certifications over traditional post-secondary programming are beginning to bridge the gap, but the increasing scale and scope of technology presents a new challenge: Finding intermediate IT pros with the ...

From Privacy to Trust and ROI

By: SLWelty
January 31, 2020
This blog was originally posted on Cisco Security Blog by author Robert Waitman. Reposted with permission. As we embark on a new decade, data privacy has become top-of-mind for business executives and consumers worldwide. Data breaches frequently expose the personal data of millions, and many companies have not done enough to protect themselves from intentional ...
Dear Cybrarians, Prior to launching Cybrary, Ralph and I had worked more than 10 years in the traditional brick-and-mortar classroom business. During that time we uncovered the countless issues that have been plaguing the industry, the most egregious of which was the high cost of training. Years of allowing for $3000-$5000 classes created high barriers to entry, and a general lack ...