Skip to content

Popular repositories Loading

  1. Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Public

    This writing explores how MFA works, its potential impact on companies, and strategies for successful implementation

    1

  2. Microsoft-Defender-for-Cloud-Apps Microsoft-Defender-for-Cloud-Apps Public

    This article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.

    1

  3. A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO Public

    Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.

    1

  4. Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Public

    This writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.

  5. A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network Public

    This article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios.

  6. Understanding-How-Cloud-Hosting-Functions Understanding-How-Cloud-Hosting-Functions Public

    This writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.

Repositories

Showing 10 of 20 repositories
  • Web-Application-Firewalls Public

    This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.

    ECCENTRIX-CA/Web-Application-Firewalls’s past year of commit activity
    0 0 0 0 Updated Jun 17, 2024
  • The-Azure-Bastion-service Public

    The Bastion service provides seamless and secure RDP (Remote Desktop Protocol) and SSH (Secure Shell) connectivity to virtual machines directly through the Azure portal.

    ECCENTRIX-CA/The-Azure-Bastion-service’s past year of commit activity
    0 0 0 0 Updated Jun 10, 2024
  • Mandatory-Access-Control-The-Linchpin-of-Information-Security-in-Controlled-Environments Public

    Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.

    ECCENTRIX-CA/Mandatory-Access-Control-The-Linchpin-of-Information-Security-in-Controlled-Environments’s past year of commit activity
    0 0 0 0 Updated May 30, 2024
  • IoT-vs.-OT-in-the-Modern-Tech-Landscape Public

    The contemporary technological ecosystem is teeming with acronyms, among which IoT (Internet of Things) and OT (Operational Technology) are pivotal.

    ECCENTRIX-CA/IoT-vs.-OT-in-the-Modern-Tech-Landscape’s past year of commit activity
    0 0 0 0 Updated May 21, 2024
  • Breaking-Encryption-Algorithms-Methods-Tools-and-Practical-Examples Public

    This article delves into the methods used to break encryption, provides practical examples, and lists tools that can be used for educational or reference purposes.

    ECCENTRIX-CA/Breaking-Encryption-Algorithms-Methods-Tools-and-Practical-Examples’s past year of commit activity
    0 0 0 0 Updated May 8, 2024
  • Distinctions-Between-Software-and-Service-A-Guide-to-Modern-Cloud-Services-Acquisition Public

    This article pinpoints the differences between software and service, and how these relate to the contemporary methods of acquiring cloud services.

    ECCENTRIX-CA/Distinctions-Between-Software-and-Service-A-Guide-to-Modern-Cloud-Services-Acquisition’s past year of commit activity
    0 0 0 0 Updated Apr 2, 2024
  • Understanding-Backups-and-Archives-Key-Differences-and-Technologies-for-Effective-Data-Management Public

    This article explores the differences between backups and archives, outlining the technologies that support these solutions.

    ECCENTRIX-CA/Understanding-Backups-and-Archives-Key-Differences-and-Technologies-for-Effective-Data-Management’s past year of commit activity
    0 0 0 0 Updated Apr 2, 2024
  • SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity Public

    This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.

    ECCENTRIX-CA/SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity’s past year of commit activity
    0 0 0 0 Updated Apr 1, 2024
  • A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO Public

    Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.

    ECCENTRIX-CA/A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO’s past year of commit activity
    1 0 0 0 Updated Apr 1, 2024
  • Types-of-PowerApps Public

    PowerApps categorizes applications into three primary types, each serving distinct purposes and offering unique advantages

    ECCENTRIX-CA/Types-of-PowerApps’s past year of commit activity
    0 0 0 0 Updated Mar 31, 2024

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…