Add
Account
Add
Account
Boris Gigovic
@Boris_Gigovic
Montreal, Quebec CA
eccentrix.ca
Joined May 29, 2023
Executive VP and owner of Eccentrix, a firm providing technological skills improvement solutions to businesses for the Canadian market.
40
notes
·
0
subscribers
Subscribe
Contacts
Message
Search
Boris Gigovic
@Boris_Gigovic
Microsoft Defender XDR: Practical Security Patterns for Modern Defense
The landscape of cybersecurity continues evolving, demanding more sophisticated approaches to threat detection and response. Through our experience delivering the Defend Against Cyberthreats with Microsoft Defender XDR (SC-5004) course, we've observed how successful security t...
Security
threatdetection
IncidentResponse
implementation
0
0
15
0
Mar 24
Boris Gigovic
@Boris_Gigovic
Microsoft Defender for Cloud: A Practical Guide to Zero Trust Evolution
The transformation of security approaches reveals fascinating patterns in how organizations implement Zero Trust principles. Through delivering our Secure Azure Services and Workloads with Microsoft Defender for Cloud (SC-5002) course, we've observed how successful organizatio...
defenderforcloud
ZeroTrust
Security
implementation
Cloudcomputing
0
0
36
0
Mar 14
Boris Gigovic
@Boris_Gigovic
Microsoft Certifications and Applied Skills: A Practical Guide to Career Growth
Technical professionals often face a critical decision: focus on certifications or build practical experience? The reality is more nuanced. Through delivering our Microsoft 365 Administrator Expert (MD-102 & MS-102) program, we've observed that the most successful IT profe...
MicrosoftCertificationCoursesAustralia
technicalskills
CareerAdvancement
itskills
professionaldevelopment
0
0
4
0
Mar 11
Boris Gigovic
@Boris_Gigovic
Microsoft Teams: Technical Problem-Solving Guide
Technical challenges in Microsoft Teams often require more than standard solutions. As explored in our Microsoft Teams Administrator Associate (MS-700) course, effective problem-solving combines systematic diagnosis with practical experience to restore service quickly and effe...
microsoftteams
Troubleshooting
technical
Support
0
0
7
0
Feb 24
Boris Gigovic
@Boris_Gigovic
SharePoint Online: Technical Implementation Guide
A practical guide to implementing SharePoint Online in modern organizations, focusing on technical configurations, best practices, and real-world solutions. Initial Configuration Start with essential setup requirements: Configure DNS settings for your SharePoint domain Set up...
SharePoint
microsoft365services
implementation
0
0
5
0
Feb 17
Boris Gigovic
@Boris_Gigovic
Exchange Online Security Features: Technical Implementation Guide
A technical guide to implementing security features in Exchange Online, covering essential configurations and best practices for protecting your email environment. Authentication Configuration Configure authentication settings: Enable modern authentication Set up multi-factor...
exchangeonline
microsoft365services
implementation
Security
emailsecurity
0
0
10
0
Feb 6
Boris Gigovic
@Boris_Gigovic
ITIL Problem Management Implementation Guide
ITIL problem management requires a structured technical approach to identify and resolve root causes of recurring incidents. This technical guide provides practical steps and essential procedures for effective implementation. Initial Setup Technical configuration steps: Role a...
ProblemManagement
servicemanagement
TechnicalProcess
itilversion4
0
0
5
0
Feb 3
Boris Gigovic
@Boris_Gigovic
Container Orchestration: Clear Implementation Concepts
Container orchestration can seem complex, but breaking it down into clear, actionable concepts makes it more approachable. Drawing from the Microsoft Certified: Azure Administrator Associate program, let's explore the fundamental concepts and practical implementation steps. Co...
implementation
azure
Kubernetes
Containerservices
0
0
16
0
Jan 14
Boris Gigovic
@Boris_Gigovic
Securing Cloud Networks: Direct Implementation Guide
Cloud network security requires clear, actionable steps for effective implementation. This guide provides direct instructions for securing your cloud network infrastructure, with specific focus on practical implementation and measurable outcomes. Core Security Components Essen...
Security
Cloud
Azure
tutorial
0
0
105
0
Dec 20, 2024
Boris Gigovic
@Boris_Gigovic
Administrative Controls: Policies, Standards, Procedures, Guidelines, and More
Administrative controls are essential components in an organization’s security framework, forming the backbone of a robust information security management system. These controls include policies, standards, procedures, guidelines, and baselines, each serving a unique purpose i...
securitypolicies
administrativecountermeasures
bestpractices
riskattentuation
0
0
8
0
Nov 25, 2024
Boris Gigovic
@Boris_Gigovic
Encryption and Obfuscation: Concepts, Use Cases, and Key Differences
In the world of cybersecurity, protecting sensitive data is paramount, and two commonly used methods for this are encryption and obfuscation. Both techniques aim to safeguard information, but they operate in distinct ways and serve different purposes. As businesses and individ...
computersecurity
Cryptography
encryption
Confidentiality
0
0
8
0
Oct 23, 2024
Boris Gigovic
@Boris_Gigovic
The Role of an Incident Management Specialist in Computer and Network Security
Introduction Incident management involves identifying, assessing, and responding to security threats and breaches in a systematic manner. This article provides an in-depth look at the responsibilities of an Incident Management Specialist, the steps involved in incident handlin...
incidentmanagement
securityincidents
threatplanning
countermeasures
0
0
14
0
Jun 21, 2024
Boris Gigovic
@Boris_Gigovic
How to Ensure Reliable Data Storage
Choose the Right Storage Solutio Cloud Storage Cloud storage solutions like AWS, Google Cloud, and Microsoft Azure offer scalable and flexible storage options. Benefits include automatic backups, high availability, and accessibility from anywhere with an internet connection. L...
datasecurity
datastrategy
DataStorageBackupSolutions
0
0
12
0
Jun 12, 2024
Boris Gigovic
@Boris_Gigovic
Deep Dive into Web Session and Network Hijacking: Intercepting Data on Network
Web session and network hijacking are critical security threats that can compromise personal and organizational data integrity. These techniques allow attackers to intercept, view, and manipulate data transmitted over networks, leading to potential breaches of confidentiality....
networkprotocols
networksecurity
CyberDefense
cyberattacks
0
0
13
0
Jun 10, 2024
Boris Gigovic
@Boris_Gigovic
Secrets management with Azure Key Vault
Introduction The Azure Key Vault service is designed to safeguard cryptographic keys and secrets used by cloud applications and services. This article delves into the intricacies of Azure Key Vault, exploring its features, benefits, and use cases in detail. What is Azure Key V...
AzureSecurity
keyvault
secretsmanagement
CloudServicesinDubai
0
0
12
0
Jun 6, 2024
Boris Gigovic
@Boris_Gigovic
Monoalphabetic and Polyalphabetic Ciphers in Cryptography Substitution Ciphers
Substitution ciphers represent one of the most fundamental categories of encryption techniques in cryptography. By substituting one element (like a letter) for another, these ciphers transform plaintext into ciphertext, making the content unintelligible to unauthorized viewers...
Cryptography
Cipher
Security
CyberDefense
0
0
19
0
May 20, 2024
Boris Gigovic
@Boris_Gigovic
Core Elements of Dynamics 365 Business Central
Dynamics 365 Business Central is an all-in-one business management solution designed for small to medium-sized businesses but scalable to accommodate the needs of larger enterprises. This cloud-based platform integrates various business functions, including finance, operations...
Dynamics365Online
Microsoft365
BusinessCentral
management
0
0
20
0
May 17, 2024
Boris Gigovic
@Boris_Gigovic
What to Avoid When Planning and Configuring Computer Virtualization
Virtualization is an essential technology that enables organizations to improve resource utilization, reduce costs, and provide more flexible IT infrastructure. However, when planning and configuring virtual environments, certain pitfalls should be carefully avoided. This arti...
virtualization
cloudcomputing
compute
resourcesmanagement
0
0
14
0
May 10, 2024
Boris Gigovic
@Boris_Gigovic
Docker and Kubernetes: A Powerful Duo for Containerization and Automation
In the world of software development and IT operations, two technologies have dramatically transformed how applications are developed, deployed, and managed: Docker and Kubernetes. These tools have become synonymous with containerization and automation, offering a robust solut...
containervirtualization
virtualapps
kubernetes
docker
0
0
26
0
Apr 24, 2024
Boris Gigovic
@Boris_Gigovic
Exploring Load Balancing and Clustering Technologies
Today, organizations rely on robust infrastructure solutions to ensure seamless operation of their applications and services. Two key technologies that play a crucial role in achieving this are load balancing and clustering. While both aim to enhance reliability and scalabilit...
clustering
loadbalancing
failover
workloaddistribution
0
0
11
0
Apr 9, 2024
Boris Gigovic
@Boris_Gigovic
Content Types in SharePoint Online
In the vast and versatile world of SharePoint Online, content types emerge as foundational elements that drive structured content management and enhance collaboration. Content types in SharePoint Online enable organizations to categorize and manage information consistently acr...
SharePointOnline
contentmanagement
contenttypes
Microsoft365
0
0
14
0
Mar 27, 2024
Boris Gigovic
@Boris_Gigovic
Deciphering Symmetric and Asymmetric Encryption
In the digital age, encryption is the cornerstone of data security, safeguarding information as it traverses the vast expanse of the internet. Symmetric and asymmetric encryption are two fundamental techniques that underpin most modern encryption systems. Understanding how the...
encryption
Cryptography
datasecurity
informationsecurity
0
0
21
0
Mar 24, 2024
Boris Gigovic
@Boris_Gigovic
Containers vs. Virtual Machines: Understanding the Differences and Choosing What's Best for Your Nee
In the rapidly evolving landscape of cloud computing and application deployment, two technologies stand out for their ability to isolate and manage workloads: containers and virtual machines (VMs). While both technologies offer significant advantages, understanding their diffe...
virtualmachines
InfrastructureasaService
virtualization
cloudcomputing
0
0
19
0
Mar 20, 2024
Boris Gigovic
@Boris_Gigovic
Microsoft Defender for Cloud Apps
In the rapidly expanding universe of cloud computing, securing cloud environments against evolving threats is paramount. Microsoft Defender for Cloud Apps, formerly known as Microsoft Cloud App Security, emerges as a pivotal tool in this ongoing battle, offering unparalleled v...
microsoftdefender
cloudappsecurity
CloudDiscovery
clouddatasecurity
0
0
11
0
Mar 18, 2024
Boris Gigovic
@Boris_Gigovic
Unveiling the Cloud Computing Revolution
In today's digitized era, cloud computing emerges as the backbone of innovation, fueling enterprises and startups alike towards unprecedented agility and scalability. As we navigate through the intricacies of this digital phenomenon, we uncover statistics that not only showcas...
cloudcomputing
clouduse
cloudproductivity
cloudresources
0
0
18
0
Mar 1, 2024
Boris Gigovic
@Boris_Gigovic
Understanding the Differences Between Cloud Hosting and VPS Hosting
In the realm of hosting services, two prevalent options often considered are Cloud Hosting and VPS Hosting. While both provide hosting solutions, they possess distinct characteristics and functionalities. Cloud Hosting Cloud Hosting involves hosting websites or applications on...
hostingtypes
cloudtypes
VPShosting
virtualprivateservers
0
0
18
0
Dec 22, 2023
Boris Gigovic
@Boris_Gigovic
Mastering Digital Investigations: The Top 10 Computer Forensics Tools
Introduction Computer forensics is the art and science of collecting, preserving, and analyzing digital evidence to investigate and prevent cybercrimes. In the digital age, it's crucial to have the right tools at your disposal to uncover, track, and combat computer-related cri...
computerforensics
forensictools
digitalevidence
digitalanalysis
0
0
46
0
Dec 6, 2023
Boris Gigovic
@Boris_Gigovic
Unlocking the Power of Multifactor Authentication: Strengthening Company Security
Introduction In today's interconnected world, safeguarding sensitive information is paramount for individuals and organizations. One effective method of enhancing security is through Multifactor Authentication (MFA), a robust defense against unauthorized access and data breach...
authentication
Security
mfa
connectivity
0
0
10
0
Nov 21, 2023
Boris Gigovic
@Boris_Gigovic
SharePoint sites
Introduction SharePoint is a powerful platform for collaboration, document management, and information sharing within organizations. To harness its full potential, it's crucial to understand how to design SharePoint sites effectively. In this article, we will explore the essen...
Microsoft365
SharePointOnline
sharepointsites
contentmanagement
0
0
32
0
Nov 8, 2023
Boris Gigovic
@Boris_Gigovic
Elevate Your Career with CCSP Certification: Benefits and Overview
In the fast-paced and ever-evolving world of cybersecurity, staying ahead of the curve is essential. The Certified Cloud Security Professional (CCSP) certification is your ticket to demonstrating your expertise in cloud security and advancing your career in the field. In this...
CCSP
cloudsecurity
Certifications
trainings
0
0
18
0
Oct 12, 2023
1
2
Next »