{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Web-Application-Firewalls","owner":"ECCENTRIX-CA","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-17T12:58:38.992Z"}},{"type":"Public","name":"The-Azure-Bastion-service","owner":"ECCENTRIX-CA","isFork":false,"description":"The Bastion service provides seamless and secure RDP (Remote Desktop Protocol) and SSH (Secure Shell) connectivity to virtual machines directly through the Azure portal.","allTopics":["remoteaccess","remotedesktop","cloudnetworking","azuresecurity"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-10T13:58:18.249Z"}},{"type":"Public","name":"Mandatory-Access-Control-The-Linchpin-of-Information-Security-in-Controlled-Environments","owner":"ECCENTRIX-CA","isFork":false,"description":"Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.","allTopics":["dataprotection","accesscontrol","cyberdefense","informationsecurity"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T07:24:32.982Z"}},{"type":"Public","name":"IoT-vs.-OT-in-the-Modern-Tech-Landscape","owner":"ECCENTRIX-CA","isFork":false,"description":"The contemporary technological ecosystem is teeming with acronyms, among which IoT (Internet of Things) and OT (Operational Technology) are pivotal. ","allTopics":["cloud","integration","cybersecurity","landscape"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-21T09:31:20.408Z"}},{"type":"Public","name":"Breaking-Encryption-Algorithms-Methods-Tools-and-Practical-Examples","owner":"ECCENTRIX-CA","isFork":false,"description":"This article delves into the methods used to break encryption, provides practical examples, and lists tools that can be used for educational or reference purposes. ","allTopics":["cryptography","encryption","algorithms","computer-attacks"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-08T11:40:25.587Z"}},{"type":"Public","name":"Distinctions-Between-Software-and-Service-A-Guide-to-Modern-Cloud-Services-Acquisition","owner":"ECCENTRIX-CA","isFork":false,"description":"This article pinpoints the differences between software and service, and how these relate to the contemporary methods of acquiring cloud services.","allTopics":["cloud","software","information-technology","it-services"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-02T08:16:57.828Z"}},{"type":"Public","name":"Understanding-Backups-and-Archives-Key-Differences-and-Technologies-for-Effective-Data-Management","owner":"ECCENTRIX-CA","isFork":false,"description":"This article explores the differences between backups and archives, outlining the technologies that support these solutions.","allTopics":["backup","restore","data-management","cloud-services","archival"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-02T07:57:47.362Z"}},{"type":"Public","name":"SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity","owner":"ECCENTRIX-CA","isFork":false,"description":"This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks. ","allTopics":["vulnerability-identification","sqlinjection","cyberattack","web-vulnerabilities"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-01T12:00:49.159Z"}},{"type":"Public","name":"A-Day-in-the-Life-of-a-Chief-Information-Officer-CIO","owner":"ECCENTRIX-CA","isFork":false,"description":"Discover what a typical day of a CIO is, highlighting the tasks they execute and how they communicate with different teams to maintain the organization's security.","allTopics":["reporting","collaboration","cybersecurity","ciso","strategy-planning-and-operations"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-01T06:07:18.671Z"}},{"type":"Public","name":"Types-of-PowerApps","owner":"ECCENTRIX-CA","isFork":false,"description":"PowerApps categorizes applications into three primary types, each serving distinct purposes and offering unique advantages","allTopics":["canvas","model-driven","powerapps","powerplatform","lowcodeplatform"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:28:16.590Z"}},{"type":"Public","name":"Understanding-How-Cloud-Hosting-Functions","owner":"ECCENTRIX-CA","isFork":false,"description":"This writing explores the Cloud Hosting - a popular type of service available to customers interested in outsourcing some of their IT infrastructure.","allTopics":["scalability","cloud-infrastructure","private-cloud","public-cloud","cloud-hosting"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:24:37.147Z"}},{"type":"Public","name":"The-Microsoft-Dataverse-A-Comprehensive-Guide","owner":"ECCENTRIX-CA","isFork":false,"description":"This article is about the Microsoft Dataverse. It explores practical use cases, and provides configuration insights to help you leverage its full potential.","allTopics":["data-platform","data-management","microsoft-cloud","dataverse","power-platform"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:21:19.974Z"}},{"type":"Public","name":"Demystifying-Access-Control-Models-RBAC-MAC-and-DAC-Explained","owner":"ECCENTRIX-CA","isFork":false,"description":"This writing is about differences in RBAC, MAC, and DAC security models. It helps understand the use of each in a practical case.","allTopics":["authentication","cybersecurity","access-control","access-lists"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:17:39.298Z"}},{"type":"Public","name":"Unlocking-the-Power-of-Multifactor-Authentication-Strengthening-Company-Security","owner":"ECCENTRIX-CA","isFork":false,"description":"This writing explores how MFA works, its potential impact on companies, and strategies for successful implementation","allTopics":["security","authentication","mfa","access-control"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:13:22.543Z"}},{"type":"Public","name":"A-Comprehensive-Comparison-of-Cisco-Routing-Protocols-Making-the-Right-Choice-for-Your-Network","owner":"ECCENTRIX-CA","isFork":false,"description":"This article compares Cisco's routing protocols, shedding light on their key features, practical applications, and real-world implementation scenarios. ","allTopics":["cisco","networking","routing-protocols","ccna"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:10:48.448Z"}},{"type":"Public","name":"Microsoft-Autopilot-Device-Setup-and-Pre-configuration-for-Businesses","owner":"ECCENTRIX-CA","isFork":false,"description":"This article explores Microsoft Autopilot - its features, benefits, and practical use cases.","allTopics":["azure","autopilot","microsoft-cloud","cloud-deployment","intune"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:05:32.396Z"}},{"type":"Public","name":"Kubernetes-in-Azure-Core-Components-and-Practical-Use-Cases","owner":"ECCENTRIX-CA","isFork":false,"description":"This article discovers the core components of Kubernetes in Azure, illustrating practical use cases.","allTopics":["azure","containers","microsoft-cloud","kubernetes-deployment"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T20:00:44.388Z"}},{"type":"Public","name":"Deciphering-the-Distinctions-Host-Based-vs.-Network-Based-IDS-and-IPS","owner":"ECCENTRIX-CA","isFork":false,"description":"This article clarifies distinctions betweeen IDSes and IPSes, offering insights into their functionalities, use cases, and how they complement each other in a comprehensive security posture.","allTopics":["intrusion-detection","intrusion-prevention","network-security","host-security"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T19:56:56.514Z"}},{"type":"Public","name":"Microsoft-Defender-for-Cloud-Apps","owner":"ECCENTRIX-CA","isFork":false,"description":"This article is about Microsoft Defender for Cloud Apps, exploring its functionalities and practical use cases to illuminate how it fortifies cloud security.","allTopics":["cloud-security","azure-security","microsoft-defender","microsoft-security"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T19:51:05.766Z"}},{"type":"Public","name":"Deciphering-Symmetric-and-Asymmetric-Encryption","owner":"ECCENTRIX-CA","isFork":false,"description":"This article explores the symmetric and asymmetric encryption, their practical use cases, and provides insights into their configuration, aiming to enhance your cybersecurity posture.","allTopics":["algorithms","cybersecurity","symmetric-encryption","asymmetric-encryption"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-31T19:47:34.367Z"}}],"repositoryCount":20,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}