Forem

Dzmitry Harbachou profile picture

Dzmitry Harbachou

Full-stack developer with a passion for clean code, fast builds, and solving real-world problems.

Location Sofia, Bulgaria Joined Joined on 

Work

Full-stack TS Engineer

Cybersecurity tools: SIEM or are companies really spying on us
Cover image for Cybersecurity tools: SIEM or are companies really spying on us

Cybersecurity tools: SIEM or are companies really spying on us

Comments 2
7 min read

Want to connect with Dzmitry Harbachou?

Create an account to connect with Dzmitry Harbachou. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Boring Cybersecurity Theory: Main disciplines (Time to select your own way)
Cover image for Boring Cybersecurity Theory: Main disciplines (Time to select your own way)

Boring Cybersecurity Theory: Main disciplines (Time to select your own way)

1
Comments
8 min read
Boring Cybersecurity Theory: Ethics (Make Your Choice)
Cover image for Boring Cybersecurity Theory: Ethics (Make Your Choice)

Boring Cybersecurity Theory: Ethics (Make Your Choice)

1
Comments
5 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack
Cover image for Boring Cybersecurity Theory: Playbook and Zero-day attack

Boring Cybersecurity Theory: Playbook and Zero-day attack

1
Comments
11 min read
Boring Cybersecurity Theory: Frameworks (NIST)
Cover image for Boring Cybersecurity Theory: Frameworks (NIST)

Boring Cybersecurity Theory: Frameworks (NIST)

1
Comments
3 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
Cover image for Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

Boring Cybersecurity Theory: Controls, Frameworks, and Compliance

1
Comments
6 min read
Boring Cybersecurity Theory: Security Domains From CISSP
Cover image for Boring Cybersecurity Theory: Security Domains From CISSP

Boring Cybersecurity Theory: Security Domains From CISSP

1
Comments
5 min read
Boring Cybersecurity Theory: Risk Management
Cover image for Boring Cybersecurity Theory: Risk Management

Boring Cybersecurity Theory: Risk Management

1
Comments
8 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
Cover image for Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)
Cover image for Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
Cover image for Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

1
Comments
3 min read
Boring Cybersecurity Theory: Where it all began
Cover image for Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
loading...