Skip to content

Popular repositories Loading

  1. Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Public

    This writing explores how MFA works, its potential impact on companies, and strategies for successful implementation

    1

  2. Microsoft-Defender-for-Cloud-Apps Microsoft-Defender-for-Cloud-Apps Public

    This article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.

    1

  3. A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO Public

    Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.

    1

  4. Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Public

    This writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.

  5. A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network Public

    This article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios.

  6. Understanding-How-Cloud-Hosting-Functions Understanding-How-Cloud-Hosting-Functions Public

    This writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.

Repositories

Showing 10 of 39 repositories
  • Azure-Private-Endpoints Public

    In this article, we explore Azure Private Endpoint, a feature designed to ensure secure and private connectivity to Azure services.

    ECCENTRIX-CA/Azure-Private-Endpoints’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure Public

    In this article, we explore the differences between VPN and VNet Peering in Azure, two key technologies for network connectivity.

    ECCENTRIX-CA/Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Session-Border-Controllers-in-IP-Telephony- Public

    In this article, we explore the role of Session Border Controllers (SBCs) in IP telephony networks.

    ECCENTRIX-CA/Session-Border-Controllers-in-IP-Telephony-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Implementing-BYOD-Devices-in-the-Workplace- Public

    In this article, we explore the implementation of BYOD (Bring Your Own Device) policies in the workplace.

    ECCENTRIX-CA/Implementing-BYOD-Devices-in-the-Workplace-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • The-Application-Proxy-in-Azure- Public

    In this article, we explore the Azure Application Proxy, a secure solution for providing remote access to on-premises applications.

    ECCENTRIX-CA/The-Application-Proxy-in-Azure-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • The-Role-of-OSINT-in-Computer-Security- Public

    In this article, we explore the role of OSINT (Open-Source Intelligence) in computer security. Learn how OSINT leverages publicly available data to identify threats, assess vulnerabilities, and enhance incident response, along with best practices and tools for effective implementation.

    ECCENTRIX-CA/The-Role-of-OSINT-in-Computer-Security-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths- Public

    In this article, we explore the paths to achieving Security+ and CISSP certifications, two top credentials in cybersecurity.

    ECCENTRIX-CA/Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web- Public

    In this article, we explore the key differences between Power BI Desktop and Power BI for the Web, two essential tools in the Power BI ecosystem.

    ECCENTRIX-CA/Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot- Public

    In this article, we explore the powerful synergy between Microsoft Graph and Microsoft Copilot. Discover how these tools enhance development by combining real-time data access with AI-driven code generation, accelerating productivity and enabling innovative applications.

    ECCENTRIX-CA/Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot-’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024
  • 20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity Public

    ChatGPT This guide clarifies Microsoft 365 Groups, covering their definition, uses, differences from legacy groups, and integration with other Microsoft 365 services.

    ECCENTRIX-CA/20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity’s past year of commit activity
    0 0 0 0 Updated Dec 26, 2024

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…