Skip to content

Popular repositories Loading

  1. Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security Public

    This writing explores how MFA works, its potential impact on companies, and strategies for successful implementation

    1

  2. Microsoft-Defender-for-Cloud-Apps Microsoft-Defender-for-Cloud-Apps Public

    This article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.

    1

  3. A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO Public

    Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.

    1

  4. The-Role-of-OSINT-in-Computer-Security The-Role-of-OSINT-in-Computer-Security Public

    In this article, we explore the role of OSINT (Open-Source Intelligence) in computer security. Learn how OSINT leverages publicly available data to identify threats, assess vulnerabilities, and enh…

    1

  5. Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained Public

    This writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.

  6. A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network Public

    This article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios.

Repositories

Showing 10 of 46 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…