DEV Community

Boris Gigovic profile picture

Boris Gigovic

Involved in corporate training for more than fifteen years with a highly technical knowledge background.

Work

Executive VP at Eccentrix

Containers vs Virtual Machines: A Developer's Migration Journey

Containers vs Virtual Machines: A Developer's Migration Journey

Comments
3 min read

Want to connect with Boris Gigovic?

Create an account to connect with Boris Gigovic. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Mobile Security: Challenges, Solutions, and Best Practices

Mobile Security: Challenges, Solutions, and Best Practices

1
Comments
6 min read
Azure Lighthouse: Capabilities, Uses, and Strategies for Maximum Efficiency

Azure Lighthouse: Capabilities, Uses, and Strategies for Maximum Efficiency

Comments
5 min read
Windows 365 Desktop and Azure Desktop Virtualization

Windows 365 Desktop and Azure Desktop Virtualization

Comments
3 min read
The Concept of DMZ in Computer Networks

The Concept of DMZ in Computer Networks

Comments
3 min read
Microsoft Copilot Security

Microsoft Copilot Security

Comments
5 min read
Implementing PIM and PAM Security in Azure: A Comprehensive Guide

Implementing PIM and PAM Security in Azure: A Comprehensive Guide

Comments
4 min read
How Microsoft Dynamics 365 and Power Platform Work Together

How Microsoft Dynamics 365 and Power Platform Work Together

Comments
6 min read
Exploring the Relationship Between Microsoft Graph and Microsoft Copilot

Exploring the Relationship Between Microsoft Graph and Microsoft Copilot

3
Comments
4 min read
Computer Incident Handling: Steps, Expertise, and Best Practices

Computer Incident Handling: Steps, Expertise, and Best Practices

Comments
5 min read
Boosting Your Knowledge with Microsoft SC-900, AZ-900, and MS-900 Fundamentals Trainings

Boosting Your Knowledge with Microsoft SC-900, AZ-900, and MS-900 Fundamentals Trainings

1
Comments
5 min read
The Application Proxy in Azure

The Application Proxy in Azure

Comments
3 min read
Session Border Controllers in IP Telephony

Session Border Controllers in IP Telephony

Comments
4 min read
The Use of OATH in Authentication

The Use of OATH in Authentication

2
Comments
4 min read
Microsoft 365 Groups: A Comprehensive Guide

Microsoft 365 Groups: A Comprehensive Guide

1
Comments
5 min read
Balancing Security and Usability: Ensuring Effective Information Security without Overburdening Employees

Balancing Security and Usability: Ensuring Effective Information Security without Overburdening Employees

Comments
3 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide

Information Classification in Microsoft Purview: A Step-by-Step Guide

7
Comments
5 min read
Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Comments
2 min read
Secrets management with Azure Key Vault

Secrets management with Azure Key Vault

5
Comments
4 min read
Hub Sites in SharePoint Online

Hub Sites in SharePoint Online

3
Comments 1
4 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

2
Comments
3 min read
Kubernetes in Azure: Core Components and Practical Use Cases

Kubernetes in Azure: Core Components and Practical Use Cases

Comments
3 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
Understanding How Cloud Hosting Functions

Understanding How Cloud Hosting Functions

Comments
2 min read
Understanding the Differences Between Cloud Hosting and VPS Hosting

Understanding the Differences Between Cloud Hosting and VPS Hosting

Comments
2 min read
A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

Comments
3 min read
Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Comments
4 min read
Unraveling the Art of Phishing: Understanding the Threat to Companies

Unraveling the Art of Phishing: Understanding the Threat to Companies

Comments
4 min read
Mastering Incident Response: A Guide to Protecting Your Company

Mastering Incident Response: A Guide to Protecting Your Company

Comments
4 min read
IPv4 and IPv6: The protocol differences

IPv4 and IPv6: The protocol differences

Comments
2 min read
Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Comments
3 min read
CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

Comments
3 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

4
Comments
3 min read
Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Comments
3 min read
Interesting statistics for cybersecurity breaches in the recent years

Interesting statistics for cybersecurity breaches in the recent years

Comments
3 min read
Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Comments
3 min read
Risk management frameworks

Risk management frameworks

Comments
8 min read
The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

Comments
3 min read
The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

The Impact of Social Engineering Attacks: Strategies for Prevention and Awareness

Comments
3 min read
Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Unlocking the Potential: Exploring the Top 15 Greatest Features of VMware vSphere

Comments
3 min read
Understanding the Difference between Vulnerability Scans and Penetration Tests

Understanding the Difference between Vulnerability Scans and Penetration Tests

Comments
3 min read
Password manager security - which to choose?

Password manager security - which to choose?

Comments
2 min read
Understanding IPSec: Enhancing Network Security with Encrypted Communication

Understanding IPSec: Enhancing Network Security with Encrypted Communication

Comments
3 min read
Microsoft Sentinel as a SIEM solution

Microsoft Sentinel as a SIEM solution

Comments
7 min read
Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Azure DevOps: Streamlining Software Development and Deployment with CI/CD Pipelines

Comments
3 min read
Ten tips to maintain strong cloud cybersecurity

Ten tips to maintain strong cloud cybersecurity

Comments
4 min read
loading...