DEV Community

Boris Gigovic profile picture

Boris Gigovic

Involved in corporate training for more than fifteen years with a highly technical knowledge background.

Work

Executive VP at Eccentrix

Kubernetes in Azure: Core Components and Practical Use Cases

Kubernetes in Azure: Core Components and Practical Use Cases

Comments
3 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
Ethernet/IP vs Ethernet/TCP-IP: Differentiating Network Protocols

Ethernet/IP vs Ethernet/TCP-IP: Differentiating Network Protocols

Comments
2 min read
OSI vs TCP/IP: Understanding Network Models

OSI vs TCP/IP: Understanding Network Models

Comments
2 min read
Understanding How Cloud Hosting Functions

Understanding How Cloud Hosting Functions

Comments
2 min read
Understanding the Differences Between Cloud Hosting and VPS Hosting

Understanding the Differences Between Cloud Hosting and VPS Hosting

Comments
2 min read
A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

Comments
3 min read
Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Comments
4 min read
Unraveling the Art of Phishing: Understanding the Threat to Companies

Unraveling the Art of Phishing: Understanding the Threat to Companies

Comments
4 min read
Mastering Incident Response: A Guide to Protecting Your Company

Mastering Incident Response: A Guide to Protecting Your Company

Comments
4 min read
IPv4 and IPv6: The protocol differences

IPv4 and IPv6: The protocol differences

Comments
2 min read
Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Comments
3 min read
Demystifying Azure Identity Services: Azure Active Directory, Azure AD Domain Services, and Azure AD Directory Services

Demystifying Azure Identity Services: Azure Active Directory, Azure AD Domain Services, and Azure AD Directory Services

Comments
4 min read
CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

Comments
4 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Comments
3 min read
Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Comments
3 min read
Interesting statistics for cybersecurity breaches in the recent years

Interesting statistics for cybersecurity breaches in the recent years

Comments
3 min read
Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Comments
3 min read
Risk management frameworks

Risk management frameworks

Comments
8 min read
The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

Comments
3 min read
The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

Comments
3 min read
Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Comments
3 min read
Understanding the Difference between Vulnerability Scans and Penetration Tests

Understanding the Difference between Vulnerability Scans and Penetration Tests

Comments
3 min read
Password manager security - which to choose?

Password manager security - which to choose?

Comments
2 min read
Understanding IPSec: Enhancing Network Security with Encrypted Communication

Understanding IPSec: Enhancing Network Security with Encrypted Communication

Comments
3 min read
Microsoft Sentinel as a SIEM solution

Microsoft Sentinel as a SIEM solution

Comments
7 min read
Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Comments
3 min read
Ten tips to maintain strong cloud cybersecurity

Ten tips to maintain strong cloud cybersecurity

Comments
4 min read
loading...