Skip to main content
false
Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 8 Min Read

What Is OpenTracing?

Though the OpenTracing project is no longer supported, learn how it worked & how to migrate to the newer OpenTelemetry framework.
Learn 10 Min Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.
Learn 7 Min Read

Chaos Testing Explained

A part of SRE, chaos testing is a software testing approach where we intentionally break things in an app in order to test and strengthen its resilience.
Learn 6 Min Read

What’s ARP? Address Resolution Protocol Explained

The Address Resolution Protocol (ARP) is a fundamental network communication protocol used within LANs. Get the full story here.
Learn 9 Min Read

What Is Vulnerability Management?

Read about how a strong vulnerability management program gives companies the capacity to easily detect vulnerabilities early before they become real threats.
Learn 7 Min Read

What is Cyber Threat Intelligence?

Get a full introduction to Cyber Threat Intelligence. CTI is the best way for organizations to mitigate the risks of new cyber threats in the future.
Learn 1 Min Read

What is Attack Surface Management?

Attack surfaces can change practically daily. Attack surface management is a must-have cybersecurity strategy to identify — and promptly eliminate — vulnerabilities.
Learn 5 Min Read

Data Orchestration Explained

Orchestrate your data to maximize its value. The primary goal of data orchestration is to organize complex data to make it readily accessible.
Learn 7 Min Read

Brute Force Attacks: Techniques, Types & Prevention

Yes, brute force attacks remain a major threat in 2023. Get the latest on brute force attacks: types, trends, business impacts & how to prevent them.
Learn 4 Min Read

What Is FIDO2?

Get all the details on FIDO2, the latest authentication technology that many organizations around the world are adopting.
Learn 6 Min Read

What is Continuous Monitoring?

Learn about continuous monitoring, the ongoing detection of risks and problems within IT environments, including how it works and how to start implementing it.
Learn 7 Min Read

Availability Zones: The Complete Guide for 2024

If you use cloud services, you’ll want to be familiar with availability zones, as these play a major part in your overall cloud performance. Get the full story here.
Learn 5 Min Read

Data Analysis Skills You Need To Know

Data analysis is the skill to have today. But exactly what do you need to ace to be a great data analyst? We’ve got you covered in this article.
Learn 3 Min Read

Monitoring IaaS (Infrastructure as a Service)

Monitoring cloud services isn't easy, especially when it comes to IaaS. Read on to understand the importance of IaaS monitoring and what problems it can help you solve.
Learn 6 Min Read

CAP Theorem & Strategies for Distributed Systems

Often misunderstood, the CAP Theorem is important to get right. Learn what the CAP theorem really is about, so your distributed systems stay resilient.
Learn 4 Min Read

What are SaaS, PaaS, & IaaS?

Yes, the cloud makes work better. But which cloud model is right for you? Understand how SaaS, PaaS, and IaaS works in this ultimate guide.
Learn 8 Min Read

Agile Transformation

Agile transformation shifts your organization towards a model that is customer-centric, efficient, innovative, and focused on productive product delivery.
Learn 7 Min Read

APM Metrics: The Ultimate Guide

Go beyond traditional APM and extend your monitoring strategy to include metrics that are important in cloud-native, DevOps-oriented environments.