Skip to main content
false
Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 7 Min Read

Access Points: A Complete Introduction

All those wireless devices we rely on daily connect thanks to access points, instead of cables and wires. Learn more here.
Learn 6 Min Read

The Caesar Cipher, Explained

The Caesar Cipher is among the oldest encryption techniques used to communicate securely. It’s simple to use and easy to break, as you’ll see here.
Learn 6 Min Read

Cross-Site Scripting (XSS) & How to Prevent Attacks

Learn about Cross Site Scripting (XSS) attacks and how they work. Check out its examples, types, impacts, and ways to prevent it.
Learn 10 Min Read

Common Ransomware Attack Types

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
Learn 8 Min Read

What Is OpenTracing?

Though the OpenTracing project is no longer supported, learn how it worked & how to migrate to the newer OpenTelemetry framework.
Learn 10 Min Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.
Learn 7 Min Read

Chaos Testing Explained

A part of SRE, chaos testing is a software testing approach where we intentionally break things in an app in order to test and strengthen its resilience.
Learn 6 Min Read

What’s ARP? Address Resolution Protocol Explained

The Address Resolution Protocol (ARP) is a fundamental network communication protocol used within LANs. Get the full story here.
Learn 9 Min Read

What Is Vulnerability Management?

Read about how a strong vulnerability management program gives companies the capacity to easily detect vulnerabilities early before they become real threats.
Learn 7 Min Read

What is Cyber Threat Intelligence?

Get a full introduction to Cyber Threat Intelligence. CTI is the best way for organizations to mitigate the risks of new cyber threats in the future.
Learn 1 Min Read

What is Attack Surface Management?

Attack surfaces can change practically daily. Attack surface management is a must-have cybersecurity strategy to identify — and promptly eliminate — vulnerabilities.
Learn 5 Min Read

Data Orchestration Explained

Orchestrate your data to maximize its value. The primary goal of data orchestration is to organize complex data to make it readily accessible.
Learn 7 Min Read

Brute Force Attacks: Techniques, Types & Prevention

Yes, brute force attacks remain a major threat in 2023. Get the latest on brute force attacks: types, trends, business impacts & how to prevent them.
Learn 4 Min Read

What Is FIDO2?

Get all the details on FIDO2, the latest authentication technology that many organizations around the world are adopting.
Learn 6 Min Read

What is Continuous Monitoring?

Learn about continuous monitoring, the ongoing detection of risks and problems within IT environments, including how it works and how to start implementing it.
Learn 7 Min Read

Availability Zones: The Complete Guide for 2024

If you use cloud services, you’ll want to be familiar with availability zones, as these play a major part in your overall cloud performance. Get the full story here.
Learn 5 Min Read

Data Analysis Skills You Need To Know

Data analysis is the skill to have today. But exactly what do you need to ace to be a great data analyst? We’ve got you covered in this article.
Learn 3 Min Read

Monitoring IaaS (Infrastructure as a Service)

Monitoring cloud services isn't easy, especially when it comes to IaaS. Read on to understand the importance of IaaS monitoring and what problems it can help you solve.