DEV Community

Boris Gigovic profile picture

Boris Gigovic

Involved in corporate training for more than fifteen years with a highly technical knowledge background.

Work

Executive VP at Eccentrix

Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Comments
2 min read

Want to connect with Boris Gigovic?

Create an account to connect with Boris Gigovic. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Secrets management with Azure Key Vault

Secrets management with Azure Key Vault

3
Comments
4 min read
Hub Sites in SharePoint Online

Hub Sites in SharePoint Online

3
Comments 1
4 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

3
Comments
3 min read
Kubernetes in Azure: Core Components and Practical Use Cases

Kubernetes in Azure: Core Components and Practical Use Cases

Comments
3 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
Understanding How Cloud Hosting Functions

Understanding How Cloud Hosting Functions

Comments
2 min read
Understanding the Differences Between Cloud Hosting and VPS Hosting

Understanding the Differences Between Cloud Hosting and VPS Hosting

Comments
2 min read
A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

Comments
3 min read
Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Comments
4 min read
Unraveling the Art of Phishing: Understanding the Threat to Companies

Unraveling the Art of Phishing: Understanding the Threat to Companies

Comments
4 min read
Mastering Incident Response: A Guide to Protecting Your Company

Mastering Incident Response: A Guide to Protecting Your Company

Comments
4 min read
IPv4 and IPv6: The protocol differences

IPv4 and IPv6: The protocol differences

Comments
2 min read
Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Comments
3 min read
CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

Comments
3 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Comments
3 min read
Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Comments
3 min read
Interesting statistics for cybersecurity breaches in the recent years

Interesting statistics for cybersecurity breaches in the recent years

Comments
3 min read
Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Comments
3 min read
Risk management frameworks

Risk management frameworks

Comments
8 min read
The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

Comments
3 min read
The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

Comments
3 min read
Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Comments
3 min read
Understanding the Difference between Vulnerability Scans and Penetration Tests

Understanding the Difference between Vulnerability Scans and Penetration Tests

Comments
3 min read
Password manager security - which to choose?

Password manager security - which to choose?

Comments
2 min read
Understanding IPSec: Enhancing Network Security with Encrypted Communication

Understanding IPSec: Enhancing Network Security with Encrypted Communication

Comments
3 min read
Microsoft Sentinel as a SIEM solution

Microsoft Sentinel as a SIEM solution

Comments
7 min read
Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Comments
3 min read
Ten tips to maintain strong cloud cybersecurity

Ten tips to maintain strong cloud cybersecurity

Comments
4 min read
loading...